Apr 15, 20235 min readWhat does Security-by-Design mean?In the field of cybersecurity, the phrase and concept of security by design are no longer novel. It is a strategy that guarantees...
Dec 21, 20224 min readSocial Engineering in a Global Pandemic: Cybercrime thrives during Covid-19Techniques for social engineering have been used for thousands of years. The oldest recorded instance can be found in the Bible's book of...
Apr 11, 20202 min read12 Basic Security Best Practices for Small Organisations during COVID-19During this critical situation of the novel virus, COVID-19, organisations are facing increasing security threats. This is due to the...
Dec 14, 20193 min readAccess Control ModelsAccess control refers to the control of access to system resources from a user. The identity of the user must be authenticated and access...
Mar 8, 20182 min readCommon Web Application AttacksWeb application attacks are a result of serious weaknesses or vulnerabilities in the architecture of an application. These weaknesses...
Jan 12, 20173 min readHow to setup FTP with SSL/TLS on CentOsThere are many important things to know when setting up an ftp. first, FTP is not secure and for security reasons FTP should not be used...
Jan 10, 20172 min readUnderstanding SELinux, Mod_security SELinux (Security-Enhanced Linux) is a Linux kernel security module built into Linux and provides a mechanism by which access control...
Jan 2, 20172 min readDistributed Denial of Service - DDoSDistributed denial of service (DDoS) is one of the most damaging attacks industries and internet users are experiencing now. A...
Dec 31, 20162 min readOpen Source Monitoring Softwares for System AdministratorsThese are the list of Open source monitoring software for system administrators. 1. Nagios Core Nagios Core is open source with multiple...