SIEM

What is SIEM?

Security Information and Event Management (SIEM) is a system that helps organizations to detect and respond to cybersecurity threats. It works by collecting security data from various sources such as network devices, servers, applications, and other secur ...

OpenAI

What is ChatGPT?

ChatGPT is a language model that has been trained to generate text based on the input it receives. It is a variant of the GPT-3 model, which is a state-of-the-art language processing system developed by OpenAI. ChatGPT is designed to be able to generate t ...

API image

What is an API?

In this blog post I will be describing what is API, discuss the Twitter API vulnerability data breach which happened on December 2021 and my REST API project. What is an API? An application program interface (API) is code that allows two software progra ...

AWS Client VPN

Implementing AWS Client VPN

In this blog post I will showcase how to implement AWS Client VPN. AWS Client VPN is a fully-managed remote access VPN solution used by your remote workforce to securely access resources within both AWS and your on-premises network. Fully elastic, it aut ...

Data_security_28

AppArmor vs SELinux

SELinux SELinux (Security-Enhanced Linux), is a part of the Linux security kernel that acts as a protective agent on servers. In the Linux kernel, SELinux relies on mandatory access controls (MAC) that restrict users to rules and policies set by the syst ...

Server-amico

Linux server hardening

Linux server hardening is a set of measures used to reduce the attack surface and improve the security of your servers. Hardening can be done on different levels, from the physical level, by restricting the access of unauthorized people, to the applicatio ...

cloud computing polygonal wireframe technology concept background

What is cloud computing?

This term is used to describe a service in which a host (also known as a "Provider") provides its IT infrastructure. Here you can manage all your data just like you would on your computer.  Of course you could also buy, host and maintain your own servers ...

Data security technology background vector in blue tone

Firewall

Stateful vs. Stateless Firewalls Stateful firewalls are capable of monitoring and detecting states of all traffic on a network to track and defend based on traffic patterns and flows. Stateless firewalls, however, only focus on individual packets, using ...

CS - new

What is cyber security?

Cyber security is how individuals and organisations reduce the risk of cyber attack. Cyber security's core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access - both online and at work - ...