Securing Azure Virtual Network

Many enterprises are already reaping the exponential rewards delivered by using Infrastructure as a Service (IaaS), in the form of increased efficiency and decreased costs. By combining its reach and scope with the power of virtualization services, such as Azure…

Read More

Back to basics: Secure SSH configuration

Along with the unveiling of Container Secure, this week CloudPassage  announced the availability of CSM policies for CentOS 7 and 6. These policies are inline with the CIS CentOS Linux 7 Benchmark v2.1.1 and CIS CentOS Linux 6 Benchmark v2.0.2….

Read More

Developers make security mistakes; protect your server access

Everyone makes mistakes. Unfortunately, the posting of sensitive information that could be used to access your servers and applications could have damaging effects to your company, brand, and customers. GitHub allows greater collaboration and better management of developing projects, but if…

Read More

Mitigating security risks with mosh

Mosh is a clever ssh replacement that looks like it would be extremely useful for the typical devops person.  However, it is a brand new tool using a brand new protocol, and as such, it has not suffered the intense…

Read More

Running an SSH Server on an Alternate Port

Most UNIX/Linux administrators are familiar with SSH and its ability to secure administration settings. If SSH has a failing, it is that it is constantly being probed by attackers who are attempting to brute force well known accounts. DShield logs…

Read More