The idea of create once, use many is not new in the world of IT. The idea of create once, use many is not new in the world of IT. There is no reason to re-invent the wheel – right? Then why is it not being practiced more diligently? Is it because the consumers of various […]
Tag Archives Security
Amazon Web Services, Cloud-based sevices, CyberFlood Virtual, Currently, cloud-based services are all the rage due to agility, scalability, resiliency and cost reduction benefits that they offer to organizations providing or leveraging those services. Amazon Web Services (AWS) trusted cloud-based infrastructure has those inherent benefits which can help customers in meeting their business goals. The ultimate […]
In today’s connected world, surfing the internet is more than just a pastime, it is now a place where critical functions are performed such as eCommerce, publishing, CRM and video-streaming, just to name a few. In today’s connected world, surfing the internet is more than just a pastime, it is now a place where critical […]
Transport Layer Security has been marked by significant cryptographic breaks and implementation flaws with exploits wreaking havoc upon enterprises. The history of Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have been marked by significant cryptographic breaks and implementation flaws with exploits wreaking havoc upon enterprises and the public. TLS v1.3 is […]
The momentum for securing more web traffic via encryption is growing at an exponential rate – beyond just the requirement to encrypt user credentials The momentum for securing more and more web traffic via encryption has been growing at an exponential rate – going far beyond just the requirement to encrypt user credentials for access […]
An external network pentest without thorough open source intelligence gathering is just a glorified vulnerability scan. I did an external network pentest for a client a few weeks back that led to some decent pwnage, and as if writing the report wasn’t tiring enough, I decided to do a blog post as well. Go figure. […]
Security is hard to get right, and even in today’s security conscious world, there are a few serious vulnerabilities such as XML External Entity (XXE) that are being overlooked and end up becoming the cause for a breach. An XML External Entity (XXE) attack is a type of computer security vulnerability that is typically found […]
12
