security
-
Containers
10 Best Docker Containers for Security in 2024
Many are embracing running containers as opposed to running a virtual machines instance for workloads. There are so many great Docker containers users can look at for many different use cases and applications. However, there are also excellent container security…
-
home lab
Firewalla Gold SE Review for Home Lab
I was recently sent one of the new Firewalla Gold SE devices to test out in the home lab. However, other than the unit being sent to me for my thoughts, this is not a paid review, and I only…
-
DevOps
Terrascan: Cloud Compliance and Security Scanner for IaC
Terrascan is a cool utility that provides a code analyzer that helps to make sure your infrastructure as code is secure and compliant. Table of contentsWhat is Terrascan?Cloud sandboxTerrascanโs Features and CapabilitiesInstalling Terrascan and Setting Up a Terrascan SandboxLeveraging Terrascan…
-
Self hosted
Vaultwarden Setup with Traefik Self hosted deployment
Vaultwarden is a another option for self-hosting a password solutions for your home lab or self-hosted security. Let’s look at Vaultwarden setup with Traefik and see how you can easily set this up. Table of contentsWhat is Vaultwarden?Vaultwarden featuresOther featuresVaultwarden…
-
Security
Commvault Metallic ThreatWise Early Threat Detection with Deception Technology
There is no question that cybersecurity is at the top of the minds of businesses in 2022 and beyond. High-profile ransomware attacks and data breach events continue to plague businesses worldwide with no end in sight. Threat actors continue to…
-
Security
I created ESXi ransomware its scary easy and why you need proper security
As I am sure you have been reading about a lot lately, ESXi ransomware is gaining momentum and is becoming widespread. It means we, as VI admins, must stay sharp and fully understand the risks of ESXi ransomware and just…
-
Security
RDP vs SSH – Which should you choose?
Remote access is one of the most powerful tools in the toolbelt of an IT admin or helpdesk technician as it allows an IT worker to remotely access, configure, and administrate systems, regardless of whether they are physically near the…
-
VDI
Securing Virtual Workspaces with Praim ThinOX
No longer are the majority of workers driving into the office. The remote workforce has taken shape and is a trend that will undoubtedly continue. As a result, businesses have had to shift their infrastructure to support a largely remote…
-
Security
Patch two new Active Directory privilege escalation bugs
If Log4j wasn’t enough, Microsoft has upped the alert on two new Active Directory bugs that now have a PoC tool in the wild. What are the new Active Directory bugs that need attention from enterprise customers? Let’s take a…