Cisco Web Security Appliance S190 – Web GUI
Cisco® Web Security Appliance (WSA) offers malware protection, application visibility and control, acceptable use policy controls, insightful reporting and secure mobility to…
Learning, Sharing, Creating
Cisco® Web Security Appliance (WSA) offers malware protection, application visibility and control, acceptable use policy controls, insightful reporting and secure mobility to…
PALADIN is a bootable forensic Linux distribution based on Ubuntu and is developed and provided as a courtesy by SUMURI.…
The NGFW is the first line of defense to protect against today’s evolving threats and is a critical component of…
IGA (Identify Governance and Administration) is a central component of Identity and Access Management (IAM) designed to “manage digital identity…
SANS Cisco Mind Map A CISO (Chief Information Security Officer) has a complex role within a company. They have a…
There are a number of different ways to find out which process is sending tcp / udp traffic in computer…
OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.…
The Metasploit Framework (MSF) is far more than just a collection of exploits. It’s an infrastructure that you can build…
Kali Linux is the world’s most powerful and popular penetration testing platform, used by security professionals in a wide range…
Here is a list of top vulnerabilities found since 2015, which I am still working on to compile them together. It…
Continue with previous post “Installation and Configuration of Sophos Enterprise Console 5.1 in your Networks – 1. Installation” Steps: After…
This post is a detail documentation how to install Sophos Enterprise Console 5.1 in your networks. Pre-Requirements: copy the Sophos…