Penetration Testing and Vulnerability Scans

In our compliance services, oftentimes, we are tasked to assist our clients in security testing – either conducting those ourselves, or to verify previously conducted tests for compliance purposes. There are many occasions where clients decide to perform the scanning … Continue reading

We are Minerals being Mined

It is often said, and its almost cliche – Personal Information is the new currency. And now, with the news on Facebook and Cambridge Analytica, we are faced with the sort of global privacy crisis that we always knew it … Continue reading

PCI-DSS Segmentation with Host-Based Firewalls

One of the frequent queries we have faced in the past months as we ramp up our consultancy and advisory for travel agencies and other merchants, has been the question of segmentation. Now, before travel agencies were imposed with the … Continue reading

Alienvault: File Integrity Monitoring on Linux Part 1

If you have been deploying or troubleshooting Alienvault long enough, you would know a few things: Alienvault is one of the most flexible SIEMs in the market. It has the most varied security features, and covers almost the entire spectrum … Continue reading