Security for Oracle Database Listener

The Oracle Database listener is a module that connects an instance of the Oracle Database and its client. It is, therefore, important to ensure that this component is kept secure from cyber threats and attacks

Read More

Deception Technology– The new frontier of defense against cyberthreats

Deception technology is a new and exciting frontier for cyber resilience against bad actors and cyber threats.

Read More

MD5 Authentication Between BGP Peers on Cisco Device

The Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing information across autonomous systems (AS) on the Internet. As BGP is mostly used over internet, it is essential to keep the network secure.

Read More

Gamifying cybersecurity awareness training

Cybersecurity, at its very core, is a competition. On one side, we have defenders trying to maintain the confidentiality, integrity, and availability of their digital assets. On the other side, we have attackers with differing motives vying to control the same digital assets.

Read More

Rackspace Government Cloud Secure Configuration Baseline launches on the AWS Marketplace

We designed the Rackspace Government Cloud Secure Configuration Baseline (RGCSCB) to support government cloud workloads, delivered to the customer as an Amazon® Machine Image (AMI).

Read More

Create SFTP access between hosts in different Virtual Cloud Networks

In the Oracle® Cloud, customers can keep their application or database in a separate virtual cloud network (VCN) for each environment, which adds an extra layer of security for each environment to prevent access from users in different environments. However, this also restricts the users from copying files between the environments when required.

Read More

Configuring a per-site WAF policy with IP address restriction rules: Part three

As I mentioned in the introduction in Part one, the end goal is to demonstrate how to control inbound access based on IP address restrictions to one of my two websites running on the Windows® virtual machine (VM). Part two of the series laid the foundation with the the Application Gateway configuration. Now, in this final post of the series, I walk thorough the Web Application Firewall (WAF) policy creation and test the custom rule. I will restrict access to site2.hiteshvadgama.co.uk.

Read More

Configuring a per-site WAF policy with IP address restriction rules: Part two

In Part one of this three-part series, I introduced the concept of the per-site web application firewall (WAF) Policy with IP address rule restrictions and set the stage for this demonstration. Part one also lays out the assumptions for the implementation walkthrough. In this post, I present the Application Gateway configuration.

Read More

Configuring a per-site WAF policy with IP address restriction rules: Part one

I recently worked with a client who had multiple public-facing Internet Information Services (IIS) websites hosted on an Azure® virtual machine (VM). The client wanted to restrict inbound internet access to one specific website by specifying a set of allowed external IP addresses and leave the traffic flow for the other websites unaffected.

Read More

Viewing your world through security-colored DevOps glasses

Originally published in Oct 2017, at Onica.com/blog

Complying with minimal regulations or certifications required by governments or customers and creating a wide window of exposure should be the goal for any first-class technology organization.

Read More