top of page

info.zecurity
...application, cloud and network security blog
Search


What does Security-by-Design mean?
In the field of cybersecurity, the phrase and concept of security by design are no longer novel. It is a strategy that guarantees...
Apr 15, 20235 min read


Social Engineering in a Global Pandemic: Cybercrime thrives during Covid-19
Techniques for social engineering have been used for thousands of years. The oldest recorded instance can be found in the Bible's book of...
Dec 21, 20224 min read


12 Basic Security Best Practices for Small Organisations during COVID-19
During this critical situation of the novel virus, COVID-19, organisations are facing increasing security threats. This is due to the...
Apr 11, 20202 min read


Access Control Models
Access control refers to the control of access to system resources from a user. The identity of the user must be authenticated and access...
Dec 14, 20193 min read


Common Web Application Attacks
Web application attacks are a result of serious weaknesses or vulnerabilities in the architecture of an application. These weaknesses...
Mar 8, 20182 min read


How to setup FTP with SSL/TLS on CentOs
There are many important things to know when setting up an ftp. first, FTP is not secure and for security reasons FTP should not be used...
Jan 12, 20173 min read


Understanding SELinux, Mod_security
SELinux (Security-Enhanced Linux) is a Linux kernel security module built into Linux and provides a mechanism by which access control...
Jan 10, 20172 min read


Distributed Denial of Service - DDoS
Distributed denial of service (DDoS) is one of the most damaging attacks industries and internet users are experiencing now. A...
Jan 2, 20172 min read


Open Source Monitoring Softwares for System Administrators
These are the list of Open source monitoring software for system administrators. 1. Nagios Core Nagios Core is open source with multiple...
Dec 31, 20162 min read
bottom of page