Are you listening to your logs? Part 4: Open Ports

Are you listening to your logs? Part 4: Open Ports

Did you know that an organization with more open ports is more vulnerable to data breaches? In the first, second, and third parts of the Are you listening to your logs? series,... Read more »

Simple Denial of Service DOS attack mitigation using HAProxy

Denial of Service (DOS) attacks can be especially effective against certain types of web application. If the application is highly dynamic or database intensive it can be remarkably simple to degrade or... Read more »

Don’t Be ‘fraid of No Ghost – WSWiR Episode 137

If you want the best network defenses, you need to stay abreast of the latest information security news; but I realize most IT folks don’t have the time to stay informed on... Read more »

Sony Breach & More – WSWiR Episode 131

Operation Cleaver, FIN4, Regin, and Sony Breach Now that cyber attacks have gone primetime, every week is filled with new information security (infosec) news, leaving administrators little time to catch up.... Read more »