Comparison of ISO27001 and SOC2 Compliances

ISO 27001 and SOC 2 COMPARISON Background There is an increased need for service organizations to provide assurance, trust and transparency over their controls to enterprises that outsource functions or processes to them (service organizations). SOC2 report – Relates to…

CHKRootKit – Eliminate The Enemy Within

Title: CHKRootKit : Eliminate The enemy within Scope of article Last month we learnt about the technical components that form the rootkits. We also discussed why and how the rootkits are dangerous and glanced at a few detection options. This…

Benefits of OpenSSH

Title: Benefits of OpenSSH Scope of article SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on network, as well as ease of installation and maintenance, SSH replaces many remote shells in…