Linux System Hardening

Linux is capable of high-end security; however, the out-of-the-box configurations must be altered to meet the security needs of most businesses with an Internet presence. This article shows you the steps for securing a Linux system called hardening the server using both manual methods and open source security solutions. The hardening process focuses on the […]

Vulnerability Assessment and Penetration Test: Staying Ahead of Security Threats

Vulnerability Assessment and Penetration Tests usually go hand in hand as part of Security Audit for major companies that they are sometimes mistakenly used interchangeably. Here, I’m going to explain the main difference between Vulnerability assessment and penetration testing and how both are critical to staying ahead of security threats. Although vulnerability assessment and pen […]

How’s Web Application Firewall (WAF) Different From the Traditional Firewall?

Web applications are a vital part of the Internet with its varied use for businesses, social media advertisements, e-commerce trading, and government services among others. As running web applications require complex languages and implementations, vulnerabilities and exploits are inadvertently introduced in the web applications landscape. Consequently, hackers leverage these to come up with dynamic attack […]

How to affix SSL on IIS Web Servers

Regardless of having your Web servers on-premise or hosted in the cloud, Making sure that your website traffic is secured is a critical priority. There are a variety of options to implement this such as doing SSL offloading on load balancers or having SSL affixed directly on the web server. If you are using Windows […]

What is Vulnerability Assessment (VA)/ Penetration Test (PT)?

A Vulnerability Assessment (VA) is the process of identifying and quantifying security vulnerabilities in an environment. It is an in-depth evaluation of your information security posture, indicating weaknesses as well as providing the appropriate mitigation procedures required to either eliminate those weaknesses or reduce them to an acceptable level of risk. A Penetration Test (PT) […]