Remove Backup Remove Linux Remove Malware Remove Network
article thumbnail

Outbound Traffic Filtering | Roadmap to Securing Your Infrastructure

Linux Academy

This is filtering provided at the network edge by a firewall with rules (ACLs) restricting what internal users are allowed to access. There are several reasons for wanting to restrict outbound communications, such as defeating malware, making data exfiltration harder, and the detection of infected hosts. Defeat Malware.

article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure.

article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In this episode, though, I’m going to focus on the much more common digital pentesters side, you know, the people who are hired to break into the digital organization, the networks, the software -- and this they can do pretty much anywhere, often without much travel. This episode dives into vulnerabilities discovered in web servers.

Network 52
article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In this episode, though, I’m going to focus on the much more common digital pentesters side, you know, the people who are hired to break into the digital organization, the networks, the software -- and this they can do pretty much anywhere, often without much travel. Which brings up a very basic question: What exactly is pentesting?

Network 52
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. They spent that time researching and understanding the environment.

System 52