"intrusion-detection devices" tag
The place for Network Security Monitoring

Best Practices in Network Security Monitoring

This article details the best practices organisations can follow to strengthen their network monitoring procedures, and also talks about a few FOSS products that help achieve this. It is imperative for an IT…

Securing Database Servers

Securing Database Servers

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider implementing security at a network layer to protect the…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.