Security Checklist for the Easter Holidays

Are you lucky enough to be going away for the Easter holidays? We’re very jealous. But before you set off into the sunset, it’s important to take a few precautions to safeguard your home against robbery in your absence. There’s nothing worse than coming home from a relaxing week away to discover your house has […]

The post Security Checklist for the Easter Holidays appeared first on Assured Security Solutions.

Read More >>

MOROCCO TO HOST CYFY AFRICA 2018

IN BREAF: Morocco will be hosting this year CyFy Africa where experts and practitioners from
around the globe expected to discuss the future the technology holds for the
Continent. CyFy Africa comes at a time when the world’s attention is centere…

Read More >>

TASKRABBIT YAKIRI KUDUKULIWA

KWA UFUPI: TaskRabbit imekua muhanga wa uhalifu mtandao – IKEA, Imethibitisha.
Hii ni katika muendelezo wa Programu tumishi
(Applications) na huduma zingine za kimtandao kuingiliwa na wahalifu mtandao
ambapo taarifa za watu zimejikuta katika miko…

Read More >>

Finding Packages for Kali Linux

In an earlier post, we covered Package Management in Kali Linux. With the ease of installation that APT provides, we have the choice amongst tens of thousands of packages but the downside is, we have tens of thousands of packages. Finding out what pack…

Read More >>

Introducing Web Security Analytics

Every security team knows that the success of any security product relies heavily on the ability to maintain an optimal security configuration. Any misconfiguration can result in malicious or undesired traffic reaching the application, or worse – legit…

Read More >>

Defensive Security Podcast Episode 215

https://www.bankinfosecurity.com/nj-ag-smacks-practice-hefty-fine-for-vendor-breach-a-10774
https://www.bankinfosecurity.com/panera-bread-data-leak-persisted-for-eight-months-a-10760
http://www.eweek.com/security/best-buy-delta-sears-hit-by-third-party…

Read More >>

The Dark Side of APIs: Part 1, API Overview

Application Programming Interfaces (API) are a software design approach which enables software and system developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for s…

Read More >>

4 Ways to Catch Criminals Red-Handed

There’s no better way to secure a conviction for the guilty and reclaim stolen possessions for the innocent than by catching a criminal red-handed. With figures from the Office for National Statistics showing that crime is up by 10% – which is the largest annual rise for a decade – it’s never been more important […]

The post 4 Ways to Catch Criminals Red-Handed appeared first on Assured Security Solutions.

Read More >>