Specifically, it tells how to ship Apache and Nginx logs over rsyslog.
The differences of SAML vs Oauth2 relate specifically around authentication and authorization. Learn how these two protocols help secure your identity goals.
ARCHIVED: The NIST HIPAA Security Rule Toolkit is no longer supported, and is provided here only for historical purposes. HIPAA Security Rule Toolkit The NIST HIPAA Security Toolkit Application is intended to help organizations better understand the...
If you're selling your PC or storage drive, you need to wipe it so well that the next person can't recover your data.
There's a new EnergyStar-like label program for connected devices—but not cars.
Three years after entering a 10-year partnership with Google, Mayo Clinic is "hoping to gather the medical records of everybody in the world."
Free Email certificates from COMODO. Our free email certificates with digital signature ensure confidentiality and privacy. Get free (S/MIME) Certificates.
[LetsEncrypt and ZeroSSL certificates are only for domain validation (web/server encryption).]
You can upload your own certificate.
A key best practice for logging is to centralize or aggregate your logs in a single location, especially if you have multiple servers or architecture tiers. Modern applications often have several tiers of infrastructure that can include a mix of on-premises servers…
[The Elastic ELK stack is popular but probably overkill; Graylog is related]
Similar guide:
https://sematext.com/blog/log-aggregation/
Uber paid two hackers $100,000 in Bitcoin to keep a 2016 data breach quiet, and now a jury has convicted former chief security officer Joe Sullivan on two charges for not reporting the incident to authorities.
An iPad makes a great “kiosk” device–a tablet restricted to one specific app for your home or small business. You can create a makeshift kiosk using the Guided Access feature, or enable Single App Mode for a true kiosk environment.
A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers. - GitHub - oauth2-proxy/oauth2-proxy: A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
[fork of the Bitly proxy; works with Nextcloud as the identity provider]
An EFF investigation of public records acquired from dozens of state and local law enforcement agencies has uncovered a widely-used mass surveillance technology. Americans are accustomed to hearing about how the National Security Agency (NSA), the Central Intelligence Agency (CIA), and even the domestically-focused Federal Bureau of Investigation (FBI) have illegally swept up
Security researchers and journalists have shown that the Rolling-PWN vulnerability affects several Honda vehicles made over the past decade. Honda says it doesn’t have a problem.