Categories
News

Cybersecurity: New NJ Privacy Law

You may have started to read about changes that may directly affect your organization. In response to Europe’s new GDPR law. In response to Europe’s new GDPR law, states have begun to draft and implement additional privacy laws and regulations. My home state of New Jersey is now attempting to lead the charge forward in […]

Categories
News

Intrusion Prevention with Fail2Ban

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python programming language, it is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, for example, iptables or TCP Wrapper. Wikipedia To assist in further locking down the exposed SSH […]

Categories
News

Techshort: IP Addresses with PowerShell

Quick PowerShell Tip! To list all of the IP addresses, both v4 and v6 on your local system, along with the associated interface name issue the following command: What you get from the above command is a grid view output which can be copied and pasted into a document.

Categories
News

Security News: Citrix Breach

If you haven’t heard, Citrix was breached through a compromised employee account due to password spraying. Password spraying is an attack that that attempts to access a large number of accounts (usernames) with a few commonly used passwords. Traditional brute-force attacks attempt to gain unauthorized access to a single account by guessing the password. The […]

Categories
News

Techshort: What is microk8s?

microk8s is Kubernetes, installed locally! microk8s is designed to be a fast and lightweight upstream Kubernetes install isolated from your host but not via a virtual machine. This isolation is achieved by packaging all the upstream binaries for Kubernetes, Docker.io, iptables, and CNI in a single appliication container What I have learned is that if […]

Categories
News

Techshort: Difference between horizontal and vertical scaling

As system & application owners we encounter a point where we need to grow our environment, but the question that often occurs is in what way do we scale. So let’s start with some defining methods of scaling today: Horizontal scaling – where you scale by adding more machines (workers) into your pool of resources. […]