6 Steps for Establishing and Maintaining Digital Integrity

To create a secure digital profile, organizations need digital integrity. This principle encapsulates two things. First, it upholds the integrity of files that store operating system and application binaries, configuration data, logs and other crucial … Continue reading 6 Steps for Establishing and Maintaining Digital Integrity

Cryptojacking Affected a Quarter of Organizations in the Cloud, Finds Report

Cryptojacking attacks affected a quarter of organizations in their cloud environments, found a recent cloud security report. In RedLock’s Cloud Security Trends, researchers with the security firm’s Cloud Security Intelligence (CSI) team dis… Continue reading Cryptojacking Affected a Quarter of Organizations in the Cloud, Finds Report

What are the security implications of publishing my web server & PHP config files?

I have a web server with many virtual hosts, config files, etc.

I’d like to track all of my web server & PHP config files using Git and have them hosted on a public GitHub repository, as this will make managing and backi… Continue reading What are the security implications of publishing my web server & PHP config files?