top of page
info.zecurity
...application, cloud and network security blog
Search
Apr 15, 20235 min read
What does Security-by-Design mean?
In the field of cybersecurity, the phrase and concept of security by design are no longer novel. It is a strategy that guarantees...
0
Dec 21, 20224 min read
Social Engineering in a Global Pandemic: Cybercrime thrives during Covid-19
Techniques for social engineering have been used for thousands of years. The oldest recorded instance can be found in the Bible's book of...
0
Apr 11, 20202 min read
12 Basic Security Best Practices for Small Organisations during COVID-19
During this critical situation of the novel virus, COVID-19, organisations are facing increasing security threats. This is due to the...
0
Dec 14, 20193 min read
Access Control Models
Access control refers to the control of access to system resources from a user. The identity of the user must be authenticated and access...
0
Mar 8, 20182 min read
Common Web Application Attacks
Web application attacks are a result of serious weaknesses or vulnerabilities in the architecture of an application. These weaknesses...
0
Jan 12, 20173 min read
How to setup FTP with SSL/TLS on CentOs
There are many important things to know when setting up an ftp. first, FTP is not secure and for security reasons FTP should not be used...
0
Jan 10, 20172 min read
Understanding SELinux, Mod_security
SELinux (Security-Enhanced Linux) is a Linux kernel security module built into Linux and provides a mechanism by which access control...
0
Jan 2, 20172 min read
Distributed Denial of Service - DDoS
Distributed denial of service (DDoS) is one of the most damaging attacks industries and internet users are experiencing now. A...
0
Dec 31, 20162 min read
Open Source Monitoring Softwares for System Administrators
These are the list of Open source monitoring software for system administrators. 1. Nagios Core Nagios Core is open source with multiple...
0
bottom of page