What is Defense In Depth?
“Defense in depth” (DiD) is a cyber security strategy that uses multiple security products and practices to safeguard an organization’s network, web properties, and resources. It is sometimes used interchangeably…
Your Go-To Source for Cyber Security Insights and Solutions
“Defense in depth” (DiD) is a cyber security strategy that uses multiple security products and practices to safeguard an organization’s network, web properties, and resources. It is sometimes used interchangeably…
Krasue infects telecom firms in Thailand using techniques for staying under the radar. Stealthy and multifunctional Linux malware that has been infecting telecommunications companies went largely unnoticed for two years…
Systemd is used by Debian, Arch, Fedora, Ubuntu, and many downstream Linux distros. Windows’ infamous “Blue Screen of Death” is a bit of a punchline. People have made a hobby…
The rsh (remote shell) program was a tool for remotely running a command on a remote computer. It has since been superseded by ssh. Everyone who still has rsh enabled…
Authentication is the process of verifying identity. It requires using passwords, hardware tokens, or several other methods. In cyber security, authentication is verifying someone’s or something’s identity. Authentication usually occurs…
Properly implemented DDoS mitigation is what keeps websites online during an attack. Explore the process of DDoS mitigation and the essential characteristics to look for in a mitigation service. What…
Single sign-on (SSO) is a vital cloud security technology that reduces all user application logins to one login for greater security and convenience. What is single sign-on (SSO)? Single sign-on…
Command line interpreter definition & common command line interfaces A command line interpreter is any program that allows one to enter commands and then execute those commands to the operating…
Virtual machines (VMs) are computers that run inside of other computers using a process known as virtualization. What is a virtual machine? A virtual machine (VM) is a software-based computer…
“The power of sudo is strong with this one!” Sudo is a command-line utility for Unix and Unix-based operating systems such as Linux and macOS. The utility provides an efficient…