Show Filters
Filtering by Topic: Enterprise Applications
3 Steps to Implementing Your Public Key Infrastructure (PKI) Architecture
Setting up a public key infrastructure helps you manage digital security certificates, encryption...
Read More about 3 Steps to Implementing Your Public Key Infrastructure (PKI) Architecture
Three things to harden OpenSSH on Linux
The OpenSSH package comes installed on most Linux distributions; however, the default configurati...
Adding SSL to Ubuntu / Apache2 / Ruby on Rails
There are many sources on Google for configuring SSL with Ubuntu, Apache2, and Ruby on Rails, but...
Read More about Adding SSL to Ubuntu / Apache2 / Ruby on Rails
How to Parse Firewall Configs with Nipper.
Who said analyzing firewalls and network devices was something tedious and cumbersome?Well your p...
Customizing and Enhancing Splunk
So what is Splunk? At its core Splunk isa search engine. It was designed toallow any da...
10 steps to harden Windows Server 2008
Ever since it’s debut, Microsoft Windows 2008 Server hasawed security and systems administr...
Security Event Log Forwarding on Windows 2008 servers
The use of a centralized log server has often been highlighted in many of today’s securitybest ...
Read More about Security Event Log Forwarding on Windows 2008 servers
Top Ten Security Requirements for Enterprise Applications
When developing an application for the enterprise, product managers have long known the “must h...
Read More about Top Ten Security Requirements for Enterprise Applications