Press "Enter" to skip to content

Posts published in “Security”

Check Your Site Vulnerability if Listing on Bounty Site.

0

As long as your web application published on Internet, one day it will face the hackers scanning. There is no 100% security and you always want to find out the vulnerability first before it can be exploited. There are many bounty programs online to attract hackers to search those vulnerabilities and publish out, also notify web master. Open Bug Bounty…

Sumuri Paladin 7 Forensics Suite Basic Usage

0

PALADIN is a bootable forensic Linux distribution based on Ubuntu and is developed and provided as a courtesy by SUMURI. The boot process has been modified to assure that the internal or external media of computers and devices are not modified or mounted. PALADIN is available as an ISO which can be used to make a bootable DVD or USB.…

Basic Procedures to Troubleshoot an Infected Computer

0

Today received a report from user, computer is slow and seems have been infected with unknown virus or malware. No special symptoms except slow. 1. Check task manager and resource monitor There is a process smss.exe which description is “Microsoft ? Console Based Script Host ” using almost 75% CPU all the time. From task manager, I found system was…

NSS Labs NGFW Security Value Map Report (2017, 2016, 2014, 2013, 2012, 2011)

0

The NGFW is the first line of defense to protect against today’s evolving threats and is a critical component of any defense-in-depth strategy.  The NSS Labs NGFW test methodology has evolved from the previous testing to reflect the threat landscape and therefore, this latest testing includes SSL inspection.  This is an important key test factor because most vendors see huge…

Gartner Magic Quadrant for Identity Governance and Administration (2018,2017,2016,2015,2013)

0

IGA (Identify Governance and Administration) is a central component of Identity and Access Management (IAM) designed to “manage digital identity and access rights across multiple systems and applications.”  Identity Governance and Administration solutions achieve this by aggregating and correlating identity and permissions data found throughout an enterprise’s digital ecosystem, and then utilizing that data to perform its core functions. Gartner…

CISO Leadership Mind Map

0

SANS Cisco Mind Map A CISO (Chief Information Security Officer) has a complex role within a company. They have a wide array of tasks to perform, that involves many differing parts, which the average individual is not always aware of. CISO Mind Map is an overview of responsibilities and ever expanding role of the CISO.  This Security Leadership poster made by…

Gartner Magic Quadrant for Access Management (2017,2016,2015 )

0

Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to propel their business forward. The world has changed, allowing an almost infinite number of identities and accounts on different platforms and devices including cloud, mobile, social, and personal networks. Having an identity and access management strategy in place is more…