Quantcast
Channel: Security – Cybersecurity Memo
Browsing all 54 articles
Browse latest View live

Threat Hunting Tools

Here are some collections from Internet about Threat Hunting tools, information and resources. 1. Kansa GitHub – Davehull/Kansa http://trustedsignal.blogspot.com/search/label/Kansa...

View Article



Proofpoint Wombat Security Education Platform Usage – Create Training Assignment

Gartner has named Proofpoint (Wombat Security) a Leader in Security Awareness Computer-Based Training for a couple of years as far as I could find. There are many functions and features I like, but one...

View Article

Qualys Scanner Appliance and Qualys Guard Service Tips and Tricks

The Qualys Cloud Platform and its integrated apps can simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full...

View Article

PFsense Configuration with Topology and Screenshots

pfSense is an open source routing and firewall software that is based on the FreeBSD distribution. The basic features including: pfSense Home Topology Static/default/dynamic routing Stateful firewall...

View Article

Cyber Security TRA (Threat and Risk Assessment) Resources Research

What is Risk: Risk = Threat x Vulnerability x Asset The enterprise risk assessment and enterprise risk management processes comprise the heart of the information security framework. These are the...

View Article


CyberArk Notes

High Level Design Vault Backup Steps Step 1: The Vault Backup utility (PAReplicate.exe) generates a metadata backup in the Vault’s Metadata Backup folder, then exports the contents of the Data folder...

View Article

Find Real IP of a Website Behind CDN

There are more and more websites using CDN (Content Delivery Network) to help deliver their contents to end users. It is faster, safer and more reliable. At the same time, CDN such as cloudflare...

View Article

CyberArk Configuration Notes and Issues

CyberArk is an info security company mainly dedicated to privileged account security. The CyberArk Privileged Account Security solution comprises features that secure, monitor and manages confidential...

View Article


CyberArk Backup, Failover and Failback Process

CyberArk Privileged Session Management (PSM) is a popular central control point that helps to protect target systems that are accessed by privileged accounts users throughout your data center. It...

View Article


Gartner Magic Quadrant for Access Management (2017,2016,2015 )

Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to propel their business forward. The world has changed, allowing an almost...

View Article

Gartner Magic Quadrant for Unified Threat Management...

Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2018 Gartner Magic Quadrant for...

View Article

Gartner Magic Quadrant for Enterprise Network Firewall...

Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support...

View Article

Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step

Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. Wombat ThreatSim Phishing...

View Article


Gartner Magic Quadrant for Endpoint Protection Platforms...

Research firm Gartner defines the Endpoint Protection Platform (EPP) market as one with offerings that “provide a collection of security capabilities to protect PCs, smartphones and tablets,” which it...

View Article

Gartner Magic Quadrant for Security Awareness Computer-Based Training...

IT research and advisory firm Gartner, Inc. has evaluated different vendors in the Magic Quadrant for Security Awareness Computer-Based Training (CBT). Gartner’s evaluation criteria includes market...

View Article


Gartner Magic Quadrant for Access Management (2017,2016,2015 )

Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to propel their business forward. The world has changed, allowing an almost...

View Article

Install Vulture WAF Cluster in VMWare Workstation

Vulture allows you to filter incoming and outgoing web trafic and block threats like injection, cross site scriping… and other attacks of the OWASP Top10. It is relying on mod_security, mod_defender...

View Article


Use Hihttps WAF to Protect Your Web Application

Recently found a interesting WAF Hihttps. Github address is https://github.com/qq4108863/hihttps and website is https://hihttps.com which says it has : Unsupervised learning autonomous confrontation...

View Article

Install FreeRadius and Daloradius on CentOS 7

FreeRADIUS is an open source RADIUS server commonly used on Linux, Unix and embedded systems. daloRADIUS is a web-based RADIUS management tool written in PHP. It was created to ease the management and...

View Article

Quick Install FreeRadius on CentOS7

There are many ways to install FreeRadius with / without MySql, with/without Web GUI manager daloRadius. This post is to summarize the quickest steps to install FreeRadius on CentOS7. It is assumed you...

View Article
Browsing all 54 articles
Browse latest View live




Latest Images