Cloud Insidr

Cybersecurity in the Age of the Machine

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for cybersecurity and cyber warfare
How to Activate HTTP/2 with TLS 1.3 Encryption in NGINX for Secure Connections without a Performance Penalty

Filipe Martins 2018-10-04 Leave a Comment

How to Activate HTTP/2 with TLS 1.3 Encryption in NGINX for Secure Connections without a Performance Penalty

 

Are you ready for a better security with no performance penalty? Are you ready for a performance bump that can take you places in search engine land? In other words: now that HTTP/2 reached production-grade maturity, nothing should hold you back.

The IoT  revolution will make sure that only the paranoid survive.

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare, web servers in the cloud Tagged With: cipher suites, Diffie-Hellman, ECDHE, FLAME, HSTS, HTTP/2, NGINX, SHA-1, SHA-2, SSL, TLS

TLS 1.3 and its implications for cyber security

Cloud Insidr 2018-10-04 Leave a Comment

TLS 1.3 and its implications for cyber security

The rise of Quantum computing and the cloud is rewriting the rules of what constitutes “encrypted” communications — with profound implications for the cyber security of our homeland.

“The cyber threat landscape is shifting in real-time, and we have reached a historic turning point,” said Kirstjen Nielsen, U.S. Secretary of Homeland Security, in a recent statement. “It is clear that our cyber adversaries can now threaten the very fabric of our republic itself.”

Cybersecurity incidents and data breaches of recent years seem to provide evidence of an invisible warfare raging across the industrialized world with financial, energy and communications systems covertly under constant threat. At the same time, the dependence on data integrity and the reliability of critical infrastructures, particularly cyber physical systems in the military, is growing in importance by the day.

[Read more…]

Filed Under: encryption, homeland security, Uncategorized

How to redirect all http to https in NGINX

Cloud Insidr 2018-09-06 Leave a Comment

How to redirect all http to https in NGINX

When setting up https on an existing server, you need to provide a redirect for all those visitors arriving via http backlinks. Here is how to do this.

[Read more…]

Filed Under: encryption, NGINX Tagged With: HTTPS, NGINX, permanent redirect

A quick guide to a solid DNS configuration using AWS Route 53 (and how to configure DNS using any other DNS service)

Anna E Kobylinska 2018-08-23 3 Comments

A quick guide to a solid DNS configuration using AWS Route 53 (and how to configure DNS using any other DNS service)

The most difficult thing about configuring the DNS settings for a domain is designing a plan of action: making up one’s mind about what kind of services you envision and how you want to route the traffic. Here’s a primer on how to configure DNS using Route 53 or any other service.

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare Tagged With: AWS, DNS, EIP, IPv4, MFA

How to use rsync to transfer files and directories between hosts

Cloud Insidr 2018-08-22 Leave a Comment

How to use rsync to transfer files and directories between hosts

The rsync utility can backup files, synchronize directory trees, and much much more, both on the local machine and between two different hosts—via push and pull. Here is how to tame it.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare Tagged With: AMI, AWS, remote host, rsync, secure connection, SSH

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • …
  • 10
  • Next Page »

Tag Cloud

AWS AWS EBS clickjacking CSRF cyber security EBS EC2 Five Eyes Alliance Gemalto HPKP HSTS IAM Java Linux log Log4j logs MFA MITM NGINX NVMe PHP RCE Route 53 SELinux SQL x509 XSS

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

SSL/TLS Certificate Square (250 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication