Et Cetera

Mon
06
May

Data Breaches: Who is behind them, why they do it, and how to protect your data

Contributed by David McDaniel
 

Mon
22
Apr

Guns for Hire: An Exploration of Booter Services

Contributed by Sam Dixon

Fri
19
Apr

Block Chain and DNS: Improving Security

Contributed by Abraham Flores
DNS technology acts as the backbone of the internet but suffers from serious vulnerabilities that have been used in major attacks. These attacks include the Mirai botnet DDoS attack on DYN’s DNS services, and the BGP/DNS poisoning of Amazon’s route 53 service. By using blockchain technology as an underlying mechanism, DNS could have improved integrity and security, and using the peer-to-peer network, complete decentralization. There are already technologies providing DNS-like services using blockchain and can be looked to for an example of implementing DNS on a blockchain-based network.
 
This document is in PDF format. To view it click here.

Tue
26
Mar

Cloud Security - Challenges and best practices

Contributed by Safwan Riyazudeen Paul Sirajudeen
The quest to access data effectively and efficiently has brought forth the birth of cloud computing technology.  The cloud computing industry is experiencing hyper-growth recently in the technology community.  It is difficult to imagine an enterprise without the usage of cloud services due to its low cost of ownership and maintenance.  This article provides an overview on some of the challenges faced by technology community using cloud services and some of the best practices that can be adapted to address them.
 
 
This document is in PDF format. To view it click here.

Sun
10
Mar

Fundamentals of Network Segmentation

Contributed by Arthur Wyatt

Pages

Subscribe to RSS - Et Cetera