Skip to content

Cyber Security Blog

Open Menu

Author: Prashant

16/01/2020

FedRAMP Cyber Security Certification 4

Compliance

Goals and Benefits of FedRAMP The Goals of FedRAMP are to 1. Ensure use of cloud services adequately protects and secures federal information. 2. Enable…

Prashant
16/01/2020

FedRAMP Cyber Security Certification 3

Compliance

FEDRAMP SECURITY ASSESSMENT FRAMEWORK FedRAMP SAF is compliant with FISMA and is based on NIST Special Publication 800- 37. Federal Agencies are needed to assess…

Prashant
16/01/2020

FedRAMP Cyber Security Certification 2

Compliance

FedRAMP Features: FedRAMP was created out of the Federal Cloud Computing Initiative to remove the barriers to the adoption of the cloud. • Cloud computing…

Prashant
16/01/2020

FedRAMP Cyber Security Certification 1

Compliance

OVERVIEW FedRAMP, The Federal Risk and Authorization Management Program is a United States Government program that standardizes how Federal Information Security Management Act (FISMA) is…

Prashant
06/01/2020

Top 10 Web Log Analyzers

Open Source Security

Title: Top 10 Web Log Analyzers Scope of article Today’s web hosting data centers are deployed with multiple web servers, running heterogeneous operating systems architecture….

Prashant
06/01/2020

Top 10 Security Vulnerability Scanners

Open Source Security

Title: Top 10 Security Vulnerability Scanners Scope of article Gone are the days when a network administrator would sit in his cozy datacenter room, sip…

Prashant
06/01/2020

Top 5 Security Assessment Tools

Open Source Security

Title: Top 5 Security Assessment Tools While performing a vulnerability scanning against a network, it needs to be done from within the network as well…

Prashant
06/01/2020

Top 3 Network Monitoring Tools

Open Source Security

Title: Top 3 Networks Monitoring Tools Scope of article In a well managed IT infrastructure, network monitoring acts as eyes and ears to spot problems…

Prashant
06/01/2020

Securing Xen Virtualization

Open Source Security

Title: Securing Xen Virtualization Scope of article The concept of virtualization was created in IT industry to achieve easy management and maintenance of the server…

Prashant
06/01/2020

Securing SSH Service

Open Source Security

Title: Securing SSH Service Scope of article SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on…

Prashant

Posts navigation

Older posts
Newer posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3