Why WAFApart from already deployed firewalls, WAF provides an extra layer of security It defends our web applications & APIs from common web attacks/exploits and bots like...
Cloud Security What is Cloud Security Cloud security is also known as cloud computing security, which refers to the method of securing cloud computing environments,...
Hello Seekers! In this blog, I will take you through the procedure of compressing files into a zip from Amazon S3 without memory or disk usage Interesting Hop in then Amazon...
Hi Folks! In this blog, we will learn how to create a custom HiveMQ extension with Maven Prerequisite Eclipse IDE for Java DevelopersHiveMQ Broker Open Eclipse and go...
In the previous blog, we discussed creating a sample HiveMQ extension project Now to move forward, In this blog we will learn how to do custom authentication in HiveMQ using the...
Encrypted Snapshot AWS Snapshots provides a solution for securing storage data in EBS volumes, boot volumes It copies the data present in the volumes which can be used for...
What is CIS Benchmark A set of configuration guidelines decided by the global community of cybersecurity experts Also, we can say this acts as a forefront system/pre-emptive...
What is PowerShell Windows PowerShell is an object-oriented command environment that has scripting language features that use a program called cmdlets to simplify the...
Introduction Cloud Computing means hosting your server, storage, database, networking, or software related services on the InternetToday, all businesses, regardless of their...
Windows Event logs on Windows Servers are an integral part of Information Technology (IT) staff and Security professionals day to day tasks They mostly help to look for any...