Best Practices

How to Secure SSH Server using Port Knocking on Ubuntu Linux

In this tutorial, we will learn how to install port knocking and set up port knocking on Ubuntu 16.04 server.

How to Secure MySQL Server on Ubuntu Linux

In this tutorial, we will through some basic steps to secure your MariaDB or MySQL databases on Ubuntu 16.04 server.

Information Security Risk Management Cycle – Overview

Review of main phases of information security risk management cycle

Information Security Risk Management – Introduction

Introduction to information security risk management – definition of risk, risk management goals and main NIST and ISO standards

Information Security Risk Management – Tiered Approach of NIST SP 800-39

Short overview of the tiered approach to information security risk management described in NIST Special Publication 800-39

Information Security Risk Management Cycle – Context Establishment Phase

Describing the context establishment phase of the information security risk management process.

ISO/IEC 27035-2 Review (cont.) – Incident Classification and Legal/Regulatory Aspects

ISO/IEC 27035 is the ISO standard on cybersecurity incident handling. What does it contain? How to make the best use of it?

NIST SP 800-61 and ISO/IEC 27035 – Attempt of Short Comparison

NIST SP 800-61 and ISO/IEC 27035 are standards (guidelines) on incident management – how do they compare?

ISO/IEC 27035-2 Review (cont.) – Improving Incident Response Plan; Awareness/Training Role

ISO/IEC 27035 is the ISO standard on cybersecurity incident handling. What does it contain? How to make the best use of it?

ISO/IEC 27035-2 Review (cont.) – SOPs, Trust and the Incident Response Team

ISO/IEC 27035 is the ISO standard on cybersecurity incident handling. What does it contain? How to make the best use of it?

Learn by Category