Select Page

Cloud Security Report–Spring 2014

The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based on the analysis of data from its customer base of around 2200 active customers. A key finding is that the increase in cloud & hosting environment...

Whitelisting in Java

Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts start recommending disabling the Java whenever possible. Now Java has come up with the option for whitelisting so that you can run Java in a safer...

Privileged account management solutions

Privileged accounts like System Administrators and Network Administrators have elevated privileges in a system. Capabilities such as unlimited access, bypassing the audit function etc are part of these accounts. This would give an administrator supreme power in a...

NMAP Tutorials–Video

Most of us use nmap as a tool for performing security assessments. NMAP helps us in many ways. When we built a team for security assessments, we thought of developing a tutorial for NMAP. Upon doing a small research, I just got stuck with so many good NMAP video...

Why we need Web application Security

In the initial days, attacks were focused on the network and operating system vulnerabilities. We have seen many such attacks resulting in network unavailability, information disclosure, denial of service etc… However, such attacks were not providing much direct...