Take a self-guided tour of Cloudflare’s Zero Trust platform

Rackspace offers Cloudflare’s Zero Trust platform which consolidates many once distinct technology solutions — Zero Trust Network Access, Secure Web Gateway, DNS Filtering, Cloud Access Security Broker (CASB), and more — into a single, natively integrated platform.

Read More

URL FIREWALL for External Node/DMZ

When configuring Oracle E-Business Suite in a DMZ configuration, you can deploy firewalls at different levels to restrict access to only the web pages required for the business.

Read More

Automation Tool to reset SAP passwords and the locking/unlocking of SAP users

It all started with a discussion with one of my colleagues who is working as an SAP security consultant.

Read More

Security for Oracle Database Listener

The Oracle Database listener is a module that connects an instance of the Oracle Database and its client. It is, therefore, important to ensure that this component is kept secure from cyber threats and attacks

Read More

Deception Technology– The new frontier of defense against cyberthreats

Deception technology is a new and exciting frontier for cyber resilience against bad actors and cyber threats.

Read More

MD5 Authentication Between BGP Peers on Cisco Device

The Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing information across autonomous systems (AS) on the Internet. As BGP is mostly used over internet, it is essential to keep the network secure.

Read More

Gamifying cybersecurity awareness training

Cybersecurity, at its very core, is a competition. On one side, we have defenders trying to maintain the confidentiality, integrity, and availability of their digital assets. On the other side, we have attackers with differing motives vying to control the same digital assets.

Read More

Rackspace Government Cloud Secure Configuration Baseline launches on the AWS Marketplace

We designed the Rackspace Government Cloud Secure Configuration Baseline (RGCSCB) to support government cloud workloads, delivered to the customer as an Amazon® Machine Image (AMI).

Read More

Create SFTP access between hosts in different Virtual Cloud Networks

In the Oracle® Cloud, customers can keep their application or database in a separate virtual cloud network (VCN) for each environment, which adds an extra layer of security for each environment to prevent access from users in different environments. However, this also restricts the users from copying files between the environments when required.

Read More

Configuring a per-site WAF policy with IP address restriction rules: Part three

As I mentioned in the introduction in Part one, the end goal is to demonstrate how to control inbound access based on IP address restrictions to one of my two websites running on the Windows® virtual machine (VM). Part two of the series laid the foundation with the the Application Gateway configuration. Now, in this final post of the series, I walk thorough the Web Application Firewall (WAF) policy creation and test the custom rule. I will restrict access to site2.hiteshvadgama.co.uk.

Read More