Managing Partner, David M. Zendzian, will be giving a short presentation on SSL/TLS protocol, security and configuration issues on Brighttalk tomorrow at 12 EST. SSL is a well designed protocol to ensure communications between two points are secured and that 3rd parties are not able to view the protected communications. As such many applications have… Read more »
Posts Categorized: Sysadmin
The first step in securing servers is to ensure that they are physically as secure as possible and and then monitored for unauthorized access Many times when setting up servers in a small office or co-location facility many people have their systems in a locking cabinet within a moderately secured physical building. However a determined… Read more »
As with any user of OSSEC, analyzing and working with the data is the key to successfully managing your environment. From a prior post you can see we are monitoring events as they occur which is good for catching serious issues as they occur; however, it is not usually the best way to document what… Read more »
Vyatta routers bring high-quality enterprise routing in an open-source package. Like many projects it was originally designed for small office/home configurations but has grown to enterprise solutions. The current documentation on filtering between zones does not tie everything together well enough to understand zone filtering. This post will walk through a complex filter configuration for a vyatta running as a border gateway and not a small office/home gateway.
Good security, not just compliance requirements, encourages IT & Security staff to spend time reviewing security events. There are many tools available for many security components of your network; this article will focus on host security and host log monitoring using OSSEC and Zabbix.
Last year PCI DSS 1.2 was released changing the intent of the controls required for anti-virus software. In version 1.1 anti-virus software was only required for systems commonly affected by viruses and excluded UNIX based operating systems and mainframes. Version 1.2 now requires all operating system types commonly affected by malicious software be protected and… Read more »