This article talks about how to setup a bug bounty program and some of the pitfalls to watch out for.
Security operations require more collaboration, quick and sometime synchronous action. ChatOps is a perfect way to manage the minute-by-minute alerts, and take informed collaborative decisions.
Sybil attacks are named after a fictional character with dissociative identity disorder
A summary of all authentication methods in the context of 2FA. Prevalent technologies in each of the methods are also explained.
This tutorial provides details of solutions available for the OpenVPN use cases and how to choose the right solution.
This tutorial looks at blockchain's fundamental technology concepts and popular implementation platforms
Bug bounties have become mainstream and rightfully so. They offer a method to access and harness the intelligence of varied set of expert hackers and security researchers without having to incur the co […]
Bots are tiny helpers that can be part of any applications and are well suited for a large scale, repetitive and real time tasks. They enable highly qualified security teams to focus on more productive t […]
Sybil attacks are named after a fictional character with dissociative identity disorder. Sybil Attacks are attacks against the reputation of online social networks by proliferation of fake profiles […]
Authentication is a critical step that forms the basis of trust on the Internet or any network based transactions. To state simply it verifies that the person or entity is who they claim to be. However a […]
OpenVPN is an open source VPN software. VPN (Virtual Private Network) is a cryptographic transport mechanism for people to be anonymous, confidential and secure by sitting behind a virtual network of s […]
Blockchain is an innovative crypto technology that enables the way forward for many systems and industries, with financial industry being the immediate beneficiary. Fairly recent, even by technology i […]
Tcpdump, as the name suggests, captures and dumps(writes) the network traffic passing through a given server’s or node’s network interfaces . It is a classic command line tool written in 1987 and re […]