Cloud Insidr

Cybersecurity in the Age of the Machine

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for Cloud Insidr
In IT to “Support and Defend”: Why Cybersecurity Is a Battlefield and Microsegmentation is Your Friend

Cloud Insidr 2015-12-29 Leave a Comment

In IT to “Support and Defend”: Why Cybersecurity Is a Battlefield and Microsegmentation is Your Friend

The traditional perimeter-focused security model has outlived its active usefulness as evidenced by the never-ending array of security breaches that constantly push the envelope on our tolerance for administrative “malpractice” in IT.

From the various security breaches in the private sector that are by now too plentiful to enumerate, through the fingerprint-stained OPM disaster, to the recently leaked database of personally identifiable information on over 191 million registered voters (in other words: all of them): no vulnerability seems too obscure, no exploit too impractical, no hack too audacious for some keyboard-toting mercenary to take advantage of the collective naiveté–or is it sheer incompetence?–of those who are paid to protect and defend access to sensitive information. How in the world did these people get their jobs, how dare they draw a salary, and how can they sleep at night? And, even more importantly: are you, by any chance, one of them?

[Read more…]

Filed Under: cybersecurity and cyber warfare Tagged With: cybersecurity, cyberwarfare

Tip of the Day: How to Extract Domain Names from Email Addresses using Regular Expressions (RegEX)

Cloud Insidr 2015-11-26 1 Comment

Tip of the Day: How to Extract Domain Names from Email Addresses using Regular Expressions (RegEX)

Extracting domain names from email addresses with the help of regular expressions takes just a nanosecond once you have the formula. The formula is the key.

[Read more…]

Filed Under: administration and orchestration, mail servers Tagged With: anti-spam defense, Notepad++, RegEx, regular expression

How to Fix PHP Session Errors while Respecting Security with Correct Permissions

Cloud Insidr 2015-11-25 Leave a Comment

How to Fix PHP Session Errors while Respecting Security with Correct Permissions

Have you ever seen one of these weird redirects? WordPress, for example, may refuse to show the log-in page, leaving you out of its admin interface for good. Here is what to do about it.

[Read more…]

Filed Under: Uncategorized, web servers in the cloud Tagged With: error, Linux, log, NGINX, permissions, PHP, php-fpm, session, session hijacking

Tip of the Day: How to Transfer PuTTY Settings to Another Computer

Cloud Insidr 2015-11-24 3 Comments

Tip of the Day: How to Transfer PuTTY Settings to Another Computer

Users of PuTTY, the popular SSH client, can transfer PuTTY’s rather extensive settings to another Windows PC by saving them in a registry file and merging the file with the local registry of the other computer, in three easy steps.

[Read more…]

Filed Under: Uncategorized Tagged With: PuTTY, SSH, Windows registry

Anti-Spam Defense: Using Postfix With smtpd Access Restrictions

Cloud Insidr 2015-11-15 Leave a Comment

Anti-Spam Defense: Using Postfix With smtpd Access Restrictions

Fighting spam, aren’t we all… To stem the tide of unwanted junk mail look no further than the built-in access restrictions in Postfix.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, mail servers Tagged With: DNS checks, HELO, logs, mail, postfix, postmap, RBL, RHSBL, smtpd, spam, Spamhaus

  • « Previous Page
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • Next Page »

Subscribe

Find the monitor that's right for you.

SSL/TLS Certificate Square (250 x 250)

Tag Cloud

AWS AWS Billing Dashboard AWS Config AWS Cost Explorer AWS EBS AWS Resource Explorer AWS Tag Editor AWS Trusted Advisor cipher suites cyber security Diffie-Hellman EBS EC2 ECDHE Five Eyes Alliance FLAME HSTS HTTP/2 Java Linux Log4j NGINX NVMe PHP RCE Route 53 SELinux SHA-1 SHA-2 SQL SSL TLS

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication