Dec 29, 2015 | Information Security, Penetration Testing
By: Hunter Gregal A key component of any enterprise network will often be a functional webserver with PHP compatibility and a database back-end. On a Linux server, a common setup is to use Apache HTTP Server as the primary webserver. Combining the Apache HTTP Server...
Dec 29, 2015 | Information Security, Penetration Testing
By: Hunter Gregal So you have an Apache2 webserver completely configured and installed on an Ubuntu/Debian machine. Perhaps you are using a MySQL backend along with PHP support (How To Install LAMP Server On Ubuntu ). But what happens when malicious attackers or bots...
Dec 2, 2015 | Compliance, Information Security, Risk Management, RSA Archer
RSA Archer 6 has been released. There has been a lot of buzz about the new release. This RSA Archer release comes with a major overhaul to the look and feel of the application. The new user experience includes a new color scheme, new fonts, new icons, and new...
Dec 1, 2015 | Information Security
By: Justin Fimlaid We come across companies and organizations all the time that need security help. Some companies are able to address the need by hiring in-house security engineers or security analysts. The Chief Information Security Officer (CISO) remains a hard...