Discover Network Security News
Segmenting for security: Five steps to protect your network
Relying on a DMZ to protect your network and data is like putting money in a bank that depends on one guard and a single gate to secure its deposits. Imagine how tempting all those piles of money would be to those who had access
Exploiting MS14-068 - just another pentest
This is a short post on how to exploit MS14-068 on Linux. This came up on my recent internal infrastructure engagement. The primary DC was a vulnerable Windows 2008 R2 SP1 server.
Why there
Open-source software plays an increasingly prominent role in many areas of modern business IT
How the cloud is changing the security game
Cloud computing offers many advantages, but with those benefits come a new range of security concerns.
DDoS attackers turn fire on ISPs and gaming servers
DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises, half-year figures from Chinese mitigation vendor NSFOCUS have confirmed.