Skip to main content

Security

Thought leadership as well as effective ways to solve cloud security issues.

Introduction to Server Security.
Talia Nassi

Introduction to Server Security

Oct 30, 2023
by Talia Nassi
Server security is vital to an effective cloud environment. Learn about it here.
Security
Defend Against Web App and API Attacks in Asia-Pacific: Akamai’s Report header image

Defend Against Web App and API Attacks in Asia-Pacific: Akamai’s Report

Learn about the top web app & API attack vectors in Asia-Pacific from Akamai’s State of the Internet report and how to better protect yourself.
Security
How SSL, TLS, & HTTPS Work video thumbnail

How SSL, TLS, & HTTPS Work | Keeping Your Connections Safe

In this video, @gardiner_bryant explains HTTPS (Hyper Text Transport Protocol Secure) and how SSL and TLS keep your connection safe.
Security
Security Survey Shows Companies Not Fully Prepared For API Attacks featuring Rupesh Chokshi from Akamai.

Security Survey Shows Companies Not Fully Prepared For API Attacks Rupesh Chokshi – Akamai

In this video, Akamai Senior Vice President and General Manager of Application Security Rupesh Chokshi shares his insights.
Security
Image features Gardiner Bryant and the text Enable 2FA along with a mobile phone, fingerprint icon, and a physical 2 factor token.

How to Add Two-Factor Authentication to Secure Your Account

In this video, Gardiner shows how to enable two-factor authentication for your Linode account for better account security.
Security
Hackersploit and Incident Response with Fireeye Redline.

Incident Response with FireEye | Final Hackersploit Blue Team Training

In this video, @HackerSploit covers using FireEye's Redline for incident response, which lets users find signs of malicious activity.
Security
Hackersploit and Docker Image Analysis with Trivy.

All-In-One Open Source Security Scanner Docker Image Analysis with Trivy

Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery and more.
Security
Web Application Firewall Overview Header
Maddie Presland

Level Up Application Security with a Web Application Firewall

Mar 16, 2023
by Maddie Presland
What to consider when evaluating a WAF and its implementation, and how to get started with a WAF that meets your application's needs.
Security
Hackersploit and Disk Analysis with Autopsy.

Disk Analysis with Autopsy | HackerSploit Blue Team Training

In this video, HackerSploit will cover using the tool Autopsy® for disk analysis which can reveal what happened to a computer.
Security
Hackersploit and Memory Forensics with Volatility.

Memory Forensics with Volatility | HackerSploit Blue Team Series

In this video, @HackerSploit will cover some examples of how to use Volatility in a Blue Team hacking scenario.
Security

Linux Memory Acquisition with LiME | HackerSploit Blue Team Training

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices.
Security

Monitor in Real-Time with OSSEC See What’s Taking Place in Your Server

In part 6 of Blue Team training, we'll cover Intrusion detection with OSSEC, an open-source, host-based intrusion detection system.
Security