Welcome to your new site.

Welcome to your new site! You can edit this page by clicking on the Edit link. For more information about customizing your site check out http://learn.wordpress.com/

Latest from the Blog

Certificate Transparency Logs

Due to the ever increasing list of network compromises, securing our online presence has become more crucial than ever. One way to ensure online security is to use SSL/TLS certificates, which encrypt data transmissions between servers and clients, making them unreadable to any third-party. However, these certificates can be compromised, causing severe security breaches. This…

Top 10 Indicators of Corporate Fraud

It is well understood that corporate fraud can have devastating consequences for an organization and that detecting and preventing fraud is essential for safeguarding the interests of the owners, investors, employees, and customers. Therefore, it is important to be aware of the leading indicators of potential corporate fraud so that companies can take proactive steps…

Best Practices for /etc/sudoers

Sudo is a powerful tool that allows users to execute commands with root privileges on a Linux system. Sudo is typically used to allow users to perform administrative tasks without giving them full access to the root account. The sudoers file, located at /etc/sudoers, controls which users can use sudo and what commands they are…

Get new content delivered directly to your inbox.

%d bloggers like this: