TLS Cipher

When TLS connection is first established, standard TLS protocol negotiates the algorithm to perform cryptographic …

Content Security Policy (CSP)

Content Security Policy (CSP) is a mechanism that developers can use to control resources which …

Protect nginx server identity

NGINX web server's default configuration allows to return the type and version that it is …

Protecting your organization from DNS infrastructure Hijacking Campaigns

Domain Name System (DNS) infrastructure hijacking is where an attacker using the compromised credentials...

Cross Site Scripting attack and prevention

Cross-Site Scripting ( abbreviated as XSS) attack is the most common application level attack technique …

How to control outbound DNS Access

User workstations, tablets and phone may be configured to send DNS requests to servers other …

How to prevent Ransomeware attack

Ransomware are the computer viruses that prevents you from using your computer unless you do …

Improving Website Security by Avoiding Mixed Content

Mixed-Content pages are the web pages that are transmitted over secure HTTPS connection but include …

PCI DSS High Level Requirements

The goal of the Payment Card Industry Data Security Standard (PCI DSS) is to protect …

How to prevent falling victim to technical support scams

Technical support scams starts with scammers claiming to be associated with companies offering legitimate support …