How to apply the best practices to your NAS devices
Nearly all organizations own some NAS device that they can use for various purposes. Firstly, as a backup destination which is the most common usage. Secondly, as a Web Server…
Nearly all organizations own some NAS device that they can use for various purposes. Firstly, as a backup destination which is the most common usage. Secondly, as a Web Server…
Secure server configurations often appear to puzzle IT professionals, while it sometimes can be a headache trying to change things around without interrupting the business flow. We can apply the…
In this post; we are going to see how to significantly enhance security on a Citrix NetScaler appliance. We will go through all steps required to get an A+ rating…
Background Nearly before Christmas 2019, Citrix publicly announced the CVE-2019-19781 vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliances that could lead to arbitrary code execution;…
In this post; we discuss how to better safeguard our infrastructure by following the "Reduce Attack Surface Approach. This model gets increasingly adopted by organisations worldwide. Its main assertion is…