Zero-Cost Threat Hunting with Elastic Stack
Setting up a Zero Cost Threat Hunting Platform with Elastic Stack and Alienvault Reputation List Elastic Stack is an awesomeRead more.
TLS/SSL Certificate Installation for Apache on Ubuntu Server
Configure Apache With TLS/SSL Certificate on Ubuntu Server Generate Certificate Create a directory place to store the file $ mkdirRead more.
CCISO Sample Questions (Part 2)
1. Which wireless encryption technology makes use of temporal keys? Options are: Extensible Authentication Protocol (EAP) Wireless Equivalence Protocol (WEP)Read more.
Information Security Vulnerability List – 2
No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management systemRead more.
Information Security Vulnerability List – 1
Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 InadequateRead more.
Useful KPIs for a Security Operation Center (SOC)
Useful KPIs for a Security Operation Center (SOC) No KPI 1 The percentage of phishing emails opened by your end-usersRead more.
iTop Add a new field (Owner) to Configuration Item
Here we are creating a custom module to add an additional field which is of object type contact to theRead more.
CCISO Sample Questions (Part 1)
1. The process of identifying and classifying assets is typically included in the Options are: Business Impact Analysis (Correct) AssetRead more.
Greenbone Vulnerability Manager 11 Installation on Ubuntu from Source
Greenbone Vulnerability Manager 11 Installation on Ubuntu 19.04 from Source The Greenbone Security Assistant is a web application that connectsRead more.
Importance of Metrics in an IT Security Program
Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decisionRead more.
ASP.NET Weblogin Using Python
ASP.NET Weblogin Using Python ASP.net websites usually send state data in requests and responses in order to keep track ofRead more.
Signing APKs with Java KeyTool
For publishing an APK in Google Play app signing by Google Play is not mandatory and we can use ourRead more.
Critical Log Review Checklist for Security Incidents
This is a checklist for reviewing critical logs when responding to a security incident. It can also be used forRead more.
Safety Tips for Parents: Cyberbullying
Safety Tips for Parents: Cyberbullying Cyberbullying is any form of bullying which takes place over digital devices like cell phones,Read more.
AWS TERMS API Gateway Amazon API Gateway makes it easy to create, maintain, monitor, and secure APIs at any scale.Read more.
Search Guard Installation for ELK Stack
Search Guard Installation and Concepts Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorization andRead more.