Porting the Gitorious installer from supporting only RedHat/Centos to support...
As our company grows we have started experiencing some pain points with using bare git repositories for our revision control. Compared to GitHub the following are the features that are most missed:...
View ArticleFirewall, Router and Switch Configuration Review
The presentation provides a topical overview of the areas to be looked at when conducting a Firewall, Router, or Switch configuration review. This presentation is based on a slide deck I prepared for...
View ArticleIs Your DDoS Mitigation Battle Tested?
The rising wave of DDoS attacks over the past twelve months have impacted many financial service organizations, in some cases costing them service downtime, productivity, brand reputation, falling...
View ArticleA Flood Without Water
In today’s day and age people usually take on a lot more than they can handle. The first task is okay, the second gets a little harder, but as the third, fourth, fifth, and sixth start piling on one...
View ArticleMitigating Your Mitigation
The evolution of DDoS throughout 2015 has been unfolding at an alarming rate. Organizations that have DDoS mitigation solutions in place are not immune to these attacks, as each new attack evolves to...
View ArticleBad Sudo
Sudo allows admins to give users permissions to perform actions as other users, primarily the root user. Normally when you give a user sudo you limit the commands that they can run as to not give any...
View ArticleDynamic DDoS Defense
Figure 1: SDN blocking a malicious attack Intro Let’s face it, DDoS attacks are growing both in size and complexity. Botnets used to launch DDoS attacks can contain anywhere from hundreds of thousands...
View ArticleDDoS – An Attacker’s Perspective
As you know, the evolution of Distributed Denial-of-Service (DDoS) attacks has many organizations scrambling to defend themselves. Even with defenses in place, a site is never truly protected until the...
View ArticleFFIEC and DDoS Testing
DDoS has now secured itself a top 5 spot on most financial institutions’ list of security risks. With a few exceptions out there, the question is no longer whether you have DDoS mitigation in place,...
View ArticleWhat is an easy way to discover all of my external facing systems?
Problem: I’ve just taken over the Internal Security Engineer position at a company. We’ve never gone through a security audit before. We know which network ranges we own. However, we have no idea what...
View Article
More Pages to Explore .....