Submit your search
How to back up SSH keys?

Backup copies allow data to be restored from an earlier point in time to help the business recover from an unplanned event. Storing the copy of the data on separate medium is critical to protect against primary data loss or corruption. Data backup should be an essential part of your computer/server usage routine. One of […]

Read More
How to create AppArmor profile for Nginx

AppArmor is a Mandatory Access Control (MAC) system which is a kernel (LSM) enhancement to confine programs to a limited set of resources. AppArmor's security model is to bind access control attributes to programs rather than to users. AppArmor confinement is provided via profiles loaded into the kernel, typically on boot. AppArmor profiles can be […]

Read More
How to protect your server using SSH keys

Secure Socket Shell (SSH), also called Secure Shell, is a special network protocol leveraging public-key cryptography to enable authorized users to remotely access a computer or other device via access credentials called SSH keys. Because they are used to access sensitive resources and perform critical, highly privileged activities, it’s vital to properly manage SSH keys […]

Read More
Malware targeting crypto wallets

SafeGuard Cyber detected a sample of the Echelon malware posted to a cryptocurrency discussion Telegram channel in October 2021. Based on the malware and the manner in which it was posted, SafeGuard Cyber believes that is was not part of a coordinated campaign and was simply targeting new or naive users of the channel. The […]

Read More
Ransomware is the biggest cyber threat to business.

Ransomware is the most significant cybersecurity threat facing organisations ranging from critical national infrastructure providers and large enterprises to schools and local businesses – but it's a threat that can be countered. In a speech at the Chatham House Cyber 2021 Conference, Lindy Cameron, CEO of the UK's National Cyber Security Centre (NCSC), warned about […]

Read More
5 Cybersecurity Trends in 2021

An influx of new threats, technologies and business models have emerged in the cybersecurity space as the world shifted to a more remote work model in response to the COVID-19 pandemic. The fact that the technology landscape is constantly changing isn’t a new revelation, but it’s certainly been taken to a new level in the last year. […]

Read More
1 5 6 7

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram