CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for cybersecurity and cyber warfare
A quick guide to a solid DNS configuration using AWS Route 53 (and how to configure DNS using any other DNS service)

Anna E Kobylinska 2018-08-23 Leave a Comment

A quick guide to a solid DNS configuration using AWS Route 53 (and how to configure DNS using any other DNS service)

The most difficult thing about configuring the DNS settings for a domain is designing a plan of action: making up one’s mind about what kind of services you envision and how you want to route the traffic. Here’s a primer on how to configure DNS using Route 53 or any other service.

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare Tagged With: AWS, DNS, EIP, IPv4, MFA

How to use rsync to transfer files and directories between hosts

Cloud Insidr 2018-08-22 Leave a Comment

How to use rsync to transfer files and directories between hosts

The rsync utility can backup files, synchronize directory trees, and much much more, both on the local machine and between two different hosts—via push and pull. Here is how to tame it.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare Tagged With: AMI, AWS, remote host, rsync, secure connection, SSH

Fixing DNS: why you need a Trusted Recursive Resolver and DNS over HTTPS

Cloud Insidr 2018-06-06 Leave a Comment

Fixing DNS: why you need a Trusted Recursive Resolver and DNS over HTTPS

The DNS system is broken. The sorry state of DNS security exposes your server and your end users to a variety of risks. Some of those risks are preventable.

[Read more…]

Filed Under: cybersecurity and cyber warfare, DNS, encryption Tagged With: DNS, DNS checks, DNS over HTTPS, encryption

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

Cloud Insidr 2018-06-03 Leave a Comment

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

TLS 1.3 and post-quantum cryptography are subjects of much debate. Upgrade or wait—this is the big question facing administrators and users alike.

There are quite a few reasons to jump onto the TLS 1.3 bandwagon immediately, with or without quantum cryptography. Here is why.  

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare, encryption Tagged With: GDPR, perfect forward secrecy, post-quantum cryptography, TLS 1.3

TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks

Cloud Insidr 2018-06-02 Leave a Comment

TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks

Only two versions of the TLS (Transport Layer Security) protocol can be considered safe under certain circumstances: TLS 1.3 and TLS 1.2. Trying to get your bank alongside everyone else to fix their websites and web applications is a Herculean task; good luck trying. Even so, you can protect TLS connections by modifying the browser configuration.

It is good to know that there is something you can do to protect at least yourself and the other end users on the networks that you oversee from nasty attacks against their TLS connections. In Firefox, you can restrict the browser to “speak” only TLS 1.3 and TLS 1.2 to limit the attack surface and restrict phishing. Here is how to do it.

[Read more…]

Filed Under: cybersecurity and cyber warfare, encryption Tagged With: TLS, TLS 1.2, TLS 1.3, TLS vulnerabilities

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 10
  • Next Page »

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication