Analyzing Linux Authentication Files
When auditing Unix-based systems, particularly some Linux flavors, some requirements arise regarding the authentication files.These systems have two main files:
Read moreWhen auditing Unix-based systems, particularly some Linux flavors, some requirements arise regarding the authentication files.These systems have two main files:
Read moreIn the Software Development Lifecycle (SDLC) and the DevSecOps world, there are different stages of security analysis. One of them
Read moreNowadays, relying on password-only authentication for AWS accounts managing production-related workload is extremely dangerours. Multi-factor authentication (MFA) is a must
Read moreLast December (2019) I had the chance to successfully pass the AWS Certified Security Specialty exam. It took me between 2 and
Read moreToday, up to 90% of security breaches are caused by software vulnerabilities, additionally penetration testing activities commonly occur near the last
Read moreThe NIST Cybersecurity Framework (CSF) is a non-profit endeavor based on best practices and using existing standards, originally intended for
Read moreSecurity requirements are foundational for every business project and should be prioritized with the same importance than Software Development (Dev)
Read moreEstablishing a robust Application Security Program is not something that occurs overnight. It is a process that inevitably requires incorporating
Read moreIn order to manage application infrastructure administrators rely on containers and tools that empower the DevOps team to package, deliver,
Read moreThe Security Content Automation Protocol, generally recognized as SCAP, enables automated vulnerability management, measurement and policy compliance evaluation of systems based on
Read more