Press "Enter" to skip to content

Posts published in “Security”

Gartner Magic Quadrant for Identity Governance and Administration (2018,2017,2016,2015,2013)

0

IGA (Identify Governance and Administration) is a central component of Identity and Access Management (IAM) designed to “manage digital identity and access rights across multiple systems and applications.”  Identity Governance and Administration solutions achieve this by aggregating and correlating identity and permissions data found throughout an enterprise’s digital ecosystem, and then utilizing that data to perform its core functions. Gartner…

CISO Leadership Mind Map

0

SANS Cisco Mind Map A CISO (Chief Information Security Officer) has a complex role within a company. They have a wide array of tasks to perform, that involves many differing parts, which the average individual is not always aware of. CISO Mind Map is an overview of responsibilities and ever expanding role of the CISO.  This Security Leadership poster made by…

Gartner Magic Quadrant for Access Management (2017,2016,2015 )

0

Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to propel their business forward. The world has changed, allowing an almost infinite number of identities and accounts on different platforms and devices including cloud, mobile, social, and personal networks. Having an identity and access management strategy in place is more…

Install OpenVAS on Ubuntu

0

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The framework is part of Greenbone Networks’ commercial vulnerability management solution from which developments are contributed to the Open Source community since 2009. 1. Install dependencies $ sudo apt–get install sqlite3 python–software–properties

OpenVAS Virtual Appliance / GreenBone Installation

0

OpenVAS Framework The GSM Community Edition is a derivate of the GSM ONE and allows a quick and easy option on Windows, Linux or Mac to give the solution a trial. No particular know-how is needed. In contrast to the commercial solution the Community Feed instead of the Greenbone Security Feed is used. Also some management functions like for TLS certificates are…

Metasploit Installation on Windows 7 and 10

0

The Metasploit Framework (MSF) is far more than just a collection of exploits. It’s an infrastructure that you can build upon and utilize for your custom needs. This allows you to concentrate on your unique environment, and not have to reinvent the wheel. I consider the MSF to be one of the single most useful auditing tools freely available to…

Kali Virtual Appliance Installation and Usage

0

Kali Linux is the world’s most powerful and popular penetration testing platform, used by security professionals in a wide range of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment. It is the culmination of years of refinement and the result of a continuous evolution of the platform, from WHoppiX to WHAX, to BackTrack, and now to a complete…

Top Security Events / Vulnerabilities in 2018, 2017, 2016, 2015, 2014

0

Here is a list of  top vulnerabilities found since 2015, which I am still working on to compile them together. It will come from different sources and includes those which I believe it is worth taking a note here. 2018 Jan 3,  Spectre and Meltdown vulnerabilities (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) Jan 29,  Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability…