Security Pro

  • Auditing Artificial Intelligence

    Technology keeps evolving, and accompanying these emerging technologies are the associated risks which if adequate security and control is not in place, can erode the overall benefits.There is a lot of buzz around Artificial intelligence as they currently form the basis for all computer learningand are considered the future of all complex decision-making. They have…

    Continue Reading

  • Five (5) frameworks for improving cybersecurity

    A cybersecurity framework provides a set of baseline best practice criteria with a goal to further strengthen the cybersecurity posture of any organization where it is implemented. Having these frameworks in place, it becomes easy to define standard processes and procedures which sustains confidentiality, integrity and availability. In this article, we will talk about five…

    Continue Reading

  • Top 10 Cybersecurity Subreddits for Security Professionals

    Reddit is a social news website and forum where information is socially vetted and promoted by site members voting. The name of the website is a pun on the phrase “I read it.” Reddit is fragmented into over a million communities known as “subreddits,” each of which tackles a certain topic. A subreddit’s name begins…

    Continue Reading

  • Five Resources on Data Privacy

    Data privacy in our world today is a very serious global issue, especially as the use of digital devices has become prevalent. A lot of companies in recent times have sold people’s personal data to third parties (other companies and private individuals) for many reasons for which advertising is paramount. This is why learning about…

    Continue Reading

  • Logging VS Monitoring and  Why you need both.

    Logging and monitoring is a term that is largely spoken about in security circles, as it plays an essential role in investigating, fine-tuning the security posture of a single digital asset or group of assets. An error log is a list of every issue affecting a server, network, operating system, or device. These log files…

    Continue Reading

  • An overview of Identity Theft

    Identity theft is a very serious security challenge, as experts believe that these cases occur so often that there is a new victim every 22 seconds. According to identitytheft.org, over 48 million identity theft cases recorded in 2020. This was an increase of 3.3% compared to the cases in 2019. Experts suggest that this problem…

    Continue Reading

  • SECURE CONFIGURATION: CIS vs STIG BENCHMARK

    During the development, building, and installation of software, databases, computers, computer devices, and network services, secure configuration is the security measure kept in place to reduce vulnerability. Why is Secure Configuration necessary? The famous saying “default settings” is an example of a set of configurations an application, database, operating system, etc. comes shipped with, which…

    Continue Reading

  • DevSecOps: An Overview

    When done the right way, DevOps implementation is sure to bring about better collaboration among teams, faster time to market, improved productivity, enhanced customer satisfaction, and increased efficiency. Unfortunately, all these efficiencies and enhancements that come with DevOps are almost useless without security. That is why DevSecOPs is the introduction of security practices into DevOps.…

    Continue Reading

  • Openid connect and oauth overview

    Over the past articles, we have been exploring the world of the middleman (Api). We have been sufficiently able to break the concept down describing what it is, the advantages it presents, how to make it secure and the tools used for assessing its security posture. In this article, we are going to explore two…

    Continue Reading

  • Tips for Securing Api’s

    API security refers to the process and/or measures of preventing or mitigating attacks on application programming interfaces (APIs). As discussed in the previous article, Application Programming Interface, or API, is a software bridge that enables communication between two applications therefore it is very important that measures are in place to ensure that the communication remains…

    Continue Reading

  • Five Questions About Mobile App Security

    Five questions about App security Mobile app security has always been a source of concern. It has even become more important than ever as mobile devices become part of our everyday lives. People are more reliant on their mobile devices, especially their mobile phones, to access everything from banking information to regular updates on live…

    Continue Reading

  • Intrusion Detection System

    An intrusion detection system (IDS) is a device or software application that monitors network traffic for suspicious activities and alerts when such activities are discovered. While detecting and reporting malicious threats and abnormalities are the basic functions of an IDS, some intrusion detection systems can also take action when malicious activities or abnormal traffic is…

    Continue Reading

  • Email Security 

    E-mail was designed to improve accessibility/communications. But the problem is that it isn’t very secure. Email Phishing attacks have been increasing in frequency, and it doesn’t seem likely to stop anytime soon, with large companies and high-profile individuals the common targets.  Attackers use emails that appear authentic to deceive recipients enticing them to part with…

    Continue Reading

  • Ransomware as a Service

    Ransomware as a Service  Ransomware attacks have been increasing in frequency, and it doesn’t seem likely to stop anytime soon, with large companies and high-profile individuals the common targets.  One of the main reasons for this sudden increase is the change from linear attacks to multi-option, this move absolves the original authors from the crime…

    Continue Reading

  • Frequently Asked Questions: Cloud Security

    How safe is the cloud? Who has access to the cloud? How can you be protected round the clock from hacking attempts? And more importantly what steps are being taken by the service providers to protect your data?  This article has been put together to help find answers to some Frequently Asked Questions related to…

    Continue Reading

  • Data Tokenization vs Data Encryption

    Data tokenization and data encryption are two major words you would often come across in the world of data security. Is data tokenization the same as data encryption? What are the differences if they are not the same? Is there any sort of similarity between them? These questions will be answered in this article. What…

    Continue Reading

  • VPN (Gateway): What It is, benefits, and why you should use one?

    VPN gateway VPN stands for “Virtual Private Network” which is designed to establish a “protected” network connection when using public networks, this makes it difficult for third parties to steal your data or track your online activities. In layman’s terms, a VPN establishes a “secure and private” connection to the internet, from your device to…

    Continue Reading

  • Database activity monitoring

    What is Database activity monitoring (DAM)? The process of observing, identifying, and reporting the activities carried out within a database with minimal effect on the performance of the system is called Database activity monitoring (DAM). Database activity monitoring is carried out by use of instantaneous security technology tools that give real-time monitored updates, analysis, and…

    Continue Reading

  • Network Data Loss Prevention

    In this post, I will talk about network data loss prevention (DLP), its importance, and some available dlp solutions. I have written some articles in the past about data, read through the blog to get updated. What is network dlp? While data is in motion, network data loss prevention (DLP) software monitors, detects and potentially…

    Continue Reading

  • Email Security

    Email security is a vital necessity because email contains sensitive information. Due to the high usage of such means of information transfer, it has since become a major target for attack. This and many more reasons are why companies are favoring the use of cloud-based email services like Gmail, Outlook, Protonmail, etc. What is Email…

    Continue Reading

  • Mobile Device Security

    Mobile security is the security measures put in place to avoid risk and vulnerability of data and assets loss attached to using mobile computing devices like smartphones, laptops, Tablets etc. What is so important about Mobile security? The use of Mobile Devices is the future: Slowly and gradually technology has evolved from using stationary devices…

    Continue Reading

  • A Run Through Owasp Top 10:2021

    OWASP top 10 and how it works What is OWASP The Open Web Application Security Project (OWASP) is a non-profit foundation dedicated to improving the security of software. OWASP operates under an ‘open community model, this model enables anyone both to participate and contribute to projects, events, online chats, and more. All materials and information…

    Continue Reading

  • Nmap Cheatsheet X

    Network mapper (NMAP) is an opensource security tool used for network exploration, security scanning and auditing In this article, I will be listing some important Nmap commands that will make network assessment easy. Let’s go! Scan single Ipaddress: nmap ipaddress Scan a host: nmap server1.abc.xyz Scan a host with more information: nmap -v server1.abc.xyz Scan…

    Continue Reading

  • 11 Steps on how HTTPS Secure connection Handshake is established

    Every HTTPS connection begins with what is called a HANDSHAKE which is the negotiation between a client and server detailing and agreeing on how they will communicate. The handshake determines the following: What cipher suite to be used to encrypt the communications, Serer verification by Client, Clients verification by Server Lets now go through the 11 steps…

    Continue Reading

  • Ransomware

    With the increasing rate of ransomware, the need to protect files and networks have become essential. Especially if as a company you store a lot of data on your server and you transfer a lot of data also. Both your server and information transfer process needs to be secured to guard against ransomware. What is…

    Continue Reading

  • SSLSCAN: Detecting security protocols in use on a server

    SSLscan is another type of port scanner similar to NMAP. However its objective is to scan SSL ports to determine what security protocols or ciphers supported and/or preferred. In this blog post we will be looking at how to access and use SSLscan. It is very useful when it comes to testing security protocols accepted…

    Continue Reading

  • How to use YASCA static code analysis tool

    Yasca which is an acronym for “Yet Another Source Code Analyzer” is an open source program which looks for security vulnerabilities, code-quality, performance, and conformance to best practices in program source code. It leverages external open-source programs, such as FindBugs, PMD, JLint, JavaScript Lint, PHPLint, Cppcheck, ClamAV, Pixy, and RATS to scan specific file types.…

    Continue Reading

  • Introduction to Oracle Virtual Private Database

    Oracle Virtual Private Database (VPD) enables you to create security policies or group policies to control database access at the row and column level. It allows multiple users to access a single schema while preventing them from accessing data which is not relevant to them. VPD uses Fine-Grained Access Control to limit the visibility of the data to…

    Continue Reading

  • How to use Mozilla firefox browser as a penetration testing tool with these add-ons

    Mozilla Firefox, is a free and open-source web browser developed by the Mozilla Foundation. It is a very powerful browser with an impressive variety of plugins. A plugin is a piece of software that acts as an add-on to a web browser and gives the browser additional functionality.

    Continue Reading

  • Brute-forcing passwords on Microsoft SQL Server to test for weakness

    SQL Server is a relational database solution created by Microsoft. It utilises several types of login to gain access to the database namely: Windows authentication which is the default, and is often referred to as integrated security because SQL Server security model is tightly integrated with Windows. In this type of authentication Windows users who have…

    Continue Reading

  • Google Dorks: The ultimate query engine

    A Google Dork, also known as Google Dorking or Google hacking, is an advanced technique to retrieve or obtain information from google. It is mostly used to find vulnerable targets and sensitive data using advanced search queries. It is a valuable resource for security researchers. Google is known as a search engine used to find…

    Continue Reading

  • VLAN: A basic understanding

    VLAN stands for Virtual Local Area Network. This is a local area network where the computers, servers and other network devices are LOGICALLY connected regardless of their physical location.

    Continue Reading

  • Data State Security in four minutes

    A data state is described as the different condition of data while being utilized in a computing environment. The term is especially used in information security.In this post, you will learn the various states data can be in. As an added bonus, you will also learn the various ways we can also protect this data at each individual states.…

    Continue Reading

  • 4 Basic Reasons Your Security Spending is Unnecessarily High

    Having a sufficient security budget is paramount to ensuring an organization’s cybersecurity program is well implemented. There’s every possibility for this budgetary figure to increase largely year after year and stakeholders keep wondering where all the money is going. In some cases, the money is well spent while in some, there’s no tangible value that…

    Continue Reading

  • Securing Active Directory Environments – Risk Concern

    This post describes in detail the most common practices in securing any Active Directory deploment, in Enterprise environments

    Continue Reading

  • 14 Faults With Your Vulnerability Management Program You do not know

    One of the biggest headaches for organizations security-wise is having to deal with technical vulnerabilities (Faults With Vulnerability Management) periodically. While some organizations have a well mapped out process to manage vulnerabilities, some others still struggle with the “Whack-A-Mole” method, randomly dealing with vulnerabilities as they appear.

    Continue Reading

About Me

Emily Parker

Fashion is a distinctive and often constant trend in the style in which a person dresses. It is the prevailing styles in behaviour.

Journey of Ziri

New Block Theme