Picture it. It was the dawn of the early internet. While computer networks had been invented, computers still could not communicate with each other. Even though the first “internet” a.k.a. ARPAnet had been invented, the implementation of such a network in the real world had not been fully realized. So, computer companies, such as IBM, […]
Read MoreIntroduction What is an intrusion detection system? Well, in it’s simplest definition an Intrusion Detection System (IDS) is a cyber burglar alarm! Now, there are different types of these cyber burglar alarms. There are host based IDSs and network based IDSs. Host based IDSs are similar to a home burglar alarm. A host based IDS’s […]
Read MoreIn today’s world, where digital threats loom large and data breaches are an unfortunate reality, safeguarding sensitive information has never been more critical. As organizations and individuals alike strive to fortify their digital defenses, the concept of “defense in depth” emerges as a fundamental strategy. At the heart of any defense in depth strategy is […]
Read MoreIntroduction Snort is a popular and powerful open-source Intrusion Detection System (IDS) that helps detect and prevent network-based attacks. Whether you are a security professional or an enthusiast, this tutorial can guide you through the process of installing and configuring Snort. By the end, you will have a functional Snort setup ready to analyze network […]
Read MoreIn today’s world, network security is critically important. An important piece of securing networks is the proper configuration of Access Control Lists (ACLs).
Read MoreSafeguarding your online activities has become more important than ever. One powerful method to safeguard your data is a Virtual Private Network (VPN).
Read MoreConfused about serverless computing? Stop! This is the only article you need! In this article I will give you a layman’s understanding of serverless computing.
Read MoreYou may hear the term “cloud security” frequently, but what does “cloud security” mean? In this post I will discuss the security challenges facing the cloud.
Read MoreMay 7, 2022 will go down in history as one of most violent stablecoin crashes of all time. On this date the Terra (UST) algorithmic stablecoin lost its one-dollar peg.
Read MoreEthical hacking is the process of breaking into networks to test their security. Ethical hackers (a.k.a. white-hat hackers or penetration testers) are hired by a companies to try to break into their network.
Read More