Category Archives: Best Practices

tunCERT Raise the Cyber Threat Level

Following latest conditions that exist on the cyber space with expectation of new attacks and threats the Tunisian CERT raised the Alert indicator to the second level. Which mean that there is a moderate risk rating for all cyber users

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it

Using mod_rewrite to harden Apache

Most installations of Apache should come with the mod_rewrite module already configured and active.  For those of you that are hosting the web server on a shared hosting environment (ie: you’ve bought a generic web hosting package), then you are

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO

10 steps To Protect MS Based System This Summer

Protecting your systems against all manner of intrusions will provide more safety for your virtual life, by using complex passwords and a regular file check against changes, plus restricting anything and everything will keep these threats away. We are now

Microsoft release the Web Application Configuration Analyzer 2.0

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of best practices is derived from the Microsoft Information Security & Risk Management Deployment

NSA Presents “Best Practices for Keeping Your Home Network Secure”

‘Best Practices for Keeping Your Home Network Secure’ is a new document published by the National Security Agency, this document comes to help and provide simple users a path for keeping their system secure and protected. Home users are faced