Reading Time: 6 minutes
What is Zero Trust Security?
Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.
Continue reading “How to Implement Zero Trust Security in 5 Steps”
Reading Time: 7 minutes
In this tutorial, we will look at several methods that are used to compromise a website. In today’s world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business.
Continue reading “How Was My Website Compromised? “
Reading Time: 20 minutes
What is Lynis?
Lynis is a well known, seasoned security tool for Linux based systems (including macOS and/or other Unix-based operating systems. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open-source software with the GPL license and available since 2007.
Continue reading “Lynis: A Security Auditing Tool For Linux”
Reading Time: 3 minutes
HIPAA, or Health Insurance Portability and Accountability Act
, sets the standard for protecting sensitive patient data. Any company handling protected health information (PHI
) must ensure that all required security measures are in place.
Essentially, you can think of HIPAA like PCI compliance, except with health information
instead of financial info
. HIPAA compliance ensures that companies handling PHI follow proper security practices and procedures. Continue reading “What Is HIPAA Compliance?”