Articles tagged with security

  1. Implementing a Secure DevOps Pipeline: Best Practices and Tools

    Posted on in system_administration

    In the modern software development landscape, DevOps has become a crucial practice for ensuring rapid delivery of high-quality software. However, with the increasing pace of development, ensuring security throughout the DevOps pipeline is more important than ever. This article will cover best practices and tools for implementing a secure DevOps …

  2. Modernizing Security Policies for Today's Organizations

    Posted on in information_systems

    Security policies are crucial components of any organization's overall strategy to protect its information assets. In the rapidly evolving landscape of technology and cybersecurity, these policies must be viewed as living documents that require regular reviews and updates. As organizations grow and their security needs change, outdated policies can leave …

  3. Securing Virtual Terminal (VTY) Lines

    Posted on in networking

    In the rapidly evolving landscape of network security, ensuring the protection of Virtual Terminal (VTY) lines on Cisco-based networks remains a critical task. VTY lines provide remote access to routers and switches, typically via telnet by default, making them prime targets for remote brute force password attacks. This article will …

  4. OpenSSH: Using a Bastion Host

    Posted on in System Administration

    Quick and dirty OpenSSH configlet here. If you have a set of hosts or devices that require you to first jump through a bastion host, the following will allow you to run a single ssh command:

    Host *
        ProxyCommand ssh -A <bastion_host> nc %h %p
    

    Change the Host * line to best …

  5. [Cisco] Telnet/SSH work, HTTP Gives Permission Denied

    Posted on in Networking

    Here are a few tips that might be helpful if you are having trouble accessing your Cisco router or switch via the web server.

    • Make sure you have the right password! This is pretty obvious, but it's definitely the first thing worth checking.
    • If you're using aaa new-model, you will …
  6. Cisco IPS Inline Bypass Mode

    Posted on in Networking

    On occasion, you may need to put your Cisco IPS into bypass mode. Bypass mode allows the IPS to pass traffic without inspecting it. This may be useful if you suspect the IPS is causing a problem, if you are going to run a one-time scan that would set the …

  7. Rate-limiting SSH connections with iptables

    Posted on in System Administration

    If you have SSH open toward the Internet, you are surely aware of the number of brute force password attempts your server sees everyday. Although a good password policy may make these attempts nothing more than an annoyance, each connection to your SSH daemon takes up valuable server resources. I …

  8. Getting Started in E-Commerce

    Posted on in Information Systems

    When building an e-commerce presence for an existing bricks and mortar retail business, two issues come to mind as needing immediate attention. The first issue isn't related to the technology of the website, but instead focuses on how the company is run. A typical company makes decisions using the strategic …

  9. Building Security Awareness

    Posted on in Information Systems

    Company X has decided to implement a new security plan. This plan includes changes to the information systems architecture and will impact the day-to-day work activities of many employees. Additionally, many operational procedures will be changed to reflect a more defensive security stance. It is not uncommon for organizations undergoing …

Slaptijack's Koding Kraken