Install Vulture WAF Cluster in VMWare Workstation
Vulture allows you to filter incoming and outgoing web trafic and block threats like injection, cross site scriping… and other attacks of the OWASP Top10. It is relying on mod_security,…
Learning, Sharing, Creating
Vulture allows you to filter incoming and outgoing web trafic and block threats like injection, cross site scriping… and other attacks of the OWASP Top10. It is relying on mod_security,…
There are no much different to install Shadow Daemon (ShadowD) on either Ubuntu18.04 or CentOS7. Install Docker and Docker-Compose Please refer my post: Simplest Steps to Install Docker and Docker…
Research firm Gartner defines the Endpoint Protection Platform (EPP) market as one with offerings that “provide a collection of security capabilities to protect PCs, smartphones and tablets,” which it said…
What is Risk: Risk = Threat x Vulnerability x Asset The enterprise risk assessment and enterprise risk management processes comprise the heart of the information security framework. These are the…
pfSense is an open source routing and firewall software that is based on the FreeBSD distribution. The basic features including: pfSense Home Topology Static/default/dynamic routing Stateful firewall Network Address Translation…
Gartner has named Proofpoint (Wombat Security) a Leader in Security Awareness Computer-Based Training for a couple of years as far as I could find. There are many functions and features…
Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. Wombat ThreatSim Phishing Simulations serivce has SaaS-based interface which…
Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and…
Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2018 Gartner Magic Quadrant for Unified Threat…
Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to propel their business forward. The world has changed, allowing an…
IT research and advisory firm Gartner, Inc. has evaluated different vendors in the Magic Quadrant for Security Awareness Computer-Based Training (CBT). Gartner’s evaluation criteria includes market understanding, marketing strategy, sales…
This post is to collect Internet resources regarding threat modeling. There are some other similar posts regarding Threat Intelligence and Threat hunting. Search my blog you will find more. Threat…