Ransomware5-Zero trust network
More details about Zero trust network
Ransomware5-Zero trust network Read More »
More details about Zero trust network
Ransomware5-Zero trust network Read More »
Network security appliance/protection 1 Firewall/WAF 2 IPS 3 Endpoint security/Antivirus Risk and Security Management 1 Security awareness 2 Security policy Customized security solutions 1 Heterogeneous network design 2 Zero-trust network design Data management 1 Data at rest 2 Data in motion 3 Data in use 4 Data backup Recovery Plan 1 Data recovery 2 Infrastructure
Ransomware4-How to prevent Read More »
Who will be the potential targets 1 High-value targets who can pay the ransom 2 Those who cannot afford service outage 3 Those who cannot afford data lose 4 Those who use their own cloud infrastructure Is your business sensitive to the data/service 1 What data do you have and what is the protection 2
Ransomware3-What matters to you Read More »
What we have for defending security attacks 1 Physical control methods 2 Technical control methods 3 Management methods Why Ransomware happened in highly secured IT environment 1 They are high-value targets, and they are will to pay ransom for their data/services 2 Lack of security awareness as usual 3 IT security system(Security appliance, Endpoint security,
Ransomware2-Why Ransomware attack happened again and again Read More »
The newer generation Ransomware happened again, and this time the victim is Garmin. Garmin’s full statement: “Garmin…today announced it was the victim of a cyberattack that encrypted some of our systems on July 23, 2020. As a result, many of our online services were interrupted including website functions, customer support, customer facing applications, and company
Ransomware1-What happened to Garmin Read More »
Simplifying coding Coding No unsafe library function callsNo unchecked access/write Fail-secure as default Limited resource consumptionSeparate Data plane and Control planeRobust module interfacesTimeout all failed connectionsInput validation Minimize platform dependentMinimize shared or global valuesMinimize threads locks or other race conditionsMinimize PrivilegesMinimize error handling messagesMinimize type castings of pointers, use void type pointers if necessary because the
C&C++ Secure Programming Quick Guide Read More »
Choose Linux that fit your business Choose Linux that you most comfortable with Most of GNU/Linux offer similar functions, but they can perform in the different ways Development service platform Ubuntu/Debian/OpenSUSEFor development or testing platform, Ubuntu is the most reliable choice because it is the most user-friendly GNU/Linux comparing to the others. Ubuntu has a
How to choose the right GNU/Linux Read More »
Facts: Original GNU/Linux Distributions is NOT as secure as it seems. Baseline security Use single GNU/Linux distribution as baseline system if possible. Before you begin to harden GNU/Linux hosts, make sure all your Linux OS are up to date. Setup a strong password policy, password complexity, password change rules, make sure different systems use different
Hardening GNU/Linux OS Read More »