General security

The art of searching for open source intelligence

The Internet is a big ocean, and it carries loads of information you might be interested in or looking for, but where and how to find that information? Thank

A Hacker’s Tips for Running a Security Company

There's always the sting of irony when a cyber security company gets hacked. Not to mention the embarrassment and bottom line impact suffered by the victim.

SS7 protocol: How hackers might find you

The Signalling System No 7 (SS7), also known as Common Channel Signalling System 7 (CCSS7) or Common Channel Interoffice Signaling 7 (CCIS7), is a set of pro

Lessons from Writing Multiple-Choice Test InfoSec Questions

Writing multiple-choice test questions for InfoSec certification exams is challenging. By multiple-choice, I mean those questions that ask students to identi

SAP Security – Think Different

Today we will discuss how SAP Security differs from traditional IT security. While in most cases security is security, no matter what we discuss, in SAP area

Configuring a Test Lab for Data Analysis

The world of IT Security revolves around data. This data mainly consists of logs that are generated, collected, stored and analyzed. Considering the large am

Categorizing the Types of GNU/Linux users

I have been a GNU/Linux user for almost seven years now, and I have been using GNU/Linux since college. In fact, during my college years, I was the only Linu

Security in Projects: The Importance of Effective Social and Soft Skills

Security is just one part of a process for enabling information projects. However, it has become one of the most vital components to their success. This is w

EINSTEIN System is Still Too Immature to Protect Fully the US Government Networks

On Jun 2105, the US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to millions of gover

SAP Cybersecurity History

After we got to know what is SAP and why SAP Security is important, we are ready to take the next step, to learn a history of SAP Security and the most signi