Top 9 Ways To Improve Mac OS X Security

It goes without saying that you should always be on top of required updates—we're a couple months into 2016 and Apple has already issued major security updates for OS X and iOS. In some cases, however, users may be partial or restricted to ...

COBIT vs ITIL vs TOGAF: Which Is Better For Cybersecurity?

Adding a little bit of structure into one's affairs never hurts, especially when it comes to IT business processes and assets. To this end, various frameworks offer blueprints for achieving key organizational objectives like compliance and ...

Top 10 Windows 7 Vulnerabilities And Remediation Tips

Upon its release, Windows 7 was hailed as "the most secure Windows ever"—true enough at the time, but its predecessor Windows Vista didn't exactly set a high bar security-wise.  Nonetheless, the updated OS shipped with literally hundreds ...

Top 20 Critical Windows Server 2008 Vulnerabilities And Remediation Tips

Though Windows Server 2008—with features like hard drive encryption, ISV security programmability, and an improved firewall—is a significant leap forward in terms of security when compared to its predecessor Windows Server 2003, it is ...

15 Ways To Secure Apache Tomcat 8

Apache Tomcat is the leading Java application server by market share and the world's most widely used web application server overall. Currently at version 8, the popular web server has not been without its security flaws, perhaps most ...

10 Tips For Securing Your Nginx Deployment

According to Web3Techs, Nginx is the second most popular web server platform behind Apache, which is quite a feat considering the latter’s longstanding footprint in this arena. That said, more high performance websites are using Nginx over ...

Top 11 Ways To Improve MySQL Security

In the pantheon of open source heavyweights, few technologies are as ubiquitous as the MySQL RDBMS. Integral to popular software packages like WordPress and server stacks like LAMP, MySQL serves as the foundational data platform for a vast ...

Cloud Security Showdown: Tanium vs. CloudPassage

Traditional IT security mechanisms are simply ineffective at protecting today's enterprise cloud and hybrid infrastructures against cyber attackers. For this reason, numerous upstarts have risen to the challenge with innovative approaches ...

Illumio ASP vs AlienVault USM For Continuous Security Monitoring

It's been said many times before, but is always worth repeating: enterprises need a layered approach to security for combating today's cyber threats. Illumio ASP and AlienVault USM provide just that: working in conjunction with traditional ...

Kali Linux vs Backbox: Pen Testing and Ethical Hacking Linux Distros

Hackers as portrayed on the big screen are usually sitting hooded in front of a monitor with sleek, shiny black hat tools laid out on the screen. Though in reality such tools in past years were mostly CLI-based, a new generation of ...

11 Ways To Harden MS SQL Server 2008

As Redmond's flagship RDBMS solution, SQL Server provides the underlying data platform for a broad range of Microsoft enterprise solutions— from Sharepoint to BizTalk Server. This, of course, makes bolstering SQL Server security a critical ...

Top 10 OS X El Capitan Security Flaws and Remediation Tips

The twelfth major release of Apple's flagship desktop and server operating system dropped on September 30th, 2015, bringing with it a host of new and improved features like Split View, a smarter Spotlight, Metal for Core Graphics, and ...

10 Ways To Bolster PostgreSQL Security

PostgreSQL may be the world’s most advanced open source database, but its 82 documented security vulnerabilities per the CVE database also make it highly exploitable. Granted, the popular object-relational database is considered superior ...

Wireshark vs Netcat for Network Protocol Analysis

Network Protocol Analyzers (a.k.a. traffic packet analyzers or sniffers) are essential instruments in the network and/or security professional’s toolbox. The ability to examine traffic in motion across a network is critical for optimizing ...

10 Important Solaris 10 CIS Security Benchmarks

Solaris 10 is the most widely deployed Unix operating system on the market, despite flip-flopping between open and close-sourced status multiple times between versions. Notwithstanding, users are well-advised to stay proactive in ...

Top 11 OS X Vulnerabilities And How to Fix Them

OS X may be considered Apple's desktop OS magnum opus, but it certainly hasn't been without its share of vulnerabilities (1,250 to date per the CVE database). The following are the top 11 OS X vulnerabilities and exploitation prevention ...

Top 10 Red Hat Enterprise Linux 5 Security Checks

Despite crossing over the half-decade mark since its release, Red Hat Enterprise Linux (RHEL) 5 is still in widespread use—and will continue to be supported by Red Hat through November 30th 2020. Security enhancements in later versions of ...

Foreman vs Ansible Tower

When it comes to software, certain key attributes serve as a litmus test for enterprise-readiness—quality and breadth of support, reporting and policy management capabilities, and scalability are common, among others. Three characteristics ...

Hosted Chef vs Puppet Enterprise

As the two leading IT automation platforms by market share, Chef and Puppet have been compared against each other extensively—for UpGuard’s recent take, please see Puppet vs. Chef Revisited. In this comparison, we’ll instead approach ...

Foreman vs Puppet

A long time ago in a datacenter far, far away, developers and operators were writing specialized scripts by hand to manage IT resources. Configuration management (CM) and automation tools integrated these processes into streamlined ...
All posts