English

Role Based Access Control (RBAC) in Elastic Stack

Role Based Access Control (RBAC) in Elastic Stack

We are all familiar with the Elastic Stack for various purposes. Today, I will let you know about a feature which was previously paid one, but in Elastic Stack 7.0 it has been made free. Role based access control is a feature which will allow users to have permission in specific domain only. This is a must need for a large environment where there are...

Read More


APWG Phishing Activity Trends Reports for Q3’19 Raise Alarm

APWG Phishing Activity Trends Reports for Q3’19 Raise Alarm

For a long period of time phishing is one of the major cyber threats in cyberspace. Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.[1] For past few years we have noticed a rise in the phishing attack in all part of the globe. Anti Phishing...

Read More


A Step-By-Step Guide to Securing a Tomcat Server With LetsEncrypt SSL Certificate

A Step-By-Step Guide to Securing a Tomcat Server With LetsEncrypt SSL Certificate

Secure Socket Layer (SSL) is a protocol that provides security for communications between client and server by implementing encrypted data and certificate-based authentication. If you’re using Apache Tomcat as a Server for your web-application , chances are that at least some of the data you’re handling is sensitive, and SSL is an easy way to offer your users security. But the configuration process and SSL...

Read More


2019 CWE Top 25 Most Dangerous Software Errors [mitre]

2019 CWE Top 25 Most Dangerous Software Errors [mitre]

Introduction The Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Errors (CWE Top 25) is a demonstrative list of the most widespread and critical weaknesses that can lead to serious vulnerabilities in software. These weaknesses are often easy to find and exploit. They are dangerous because they will frequently allow adversaries to completely take over execution of software, steal data, or prevent the software...

Read More


Security Tip (ST19-003) Privacy and Mobile Device Apps

Security Tip (ST19-003) Privacy and Mobile Device Apps

What are the risks associated with mobile device apps? Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar inputs,...

Read More


Page 12 of 21« First...1011121314...20...Last »