Blog

IAM – 16/05/2019 tiptechnoloy_0sppo6

IAM – 16/05/2019

With Cloud IAM you can grant granular access to specific GCP resources and prevent unwanted access to other resources. Cloud IAM lets you adopt the security principle of least privilege, so you grant only the necessary access to your resources.

Step-by-step guide through the ISO 27001 / ISO 22301 Certification Audit – 17/05/2019 150 150 tiptechnoloy_0sppo6

Step-by-step guide through the ISO 27001 / ISO 22301 Certification Audit – 17/05/2019

Audits are a key component of becoming ISO 27001 / ISO 22301 certified, and your initial certification is a crucial step in detecting whether all the main elements of the management system are in place. However, for many information security or business continuity managers and consultants, this process raises many questions. For more info… contact…

Concepts related to identity – 19/05/2019 150 150 tiptechnoloy_0sppo6

Concepts related to identity – 19/05/2019

In Cloud IAM, you grant access to members. Members can be one of the following types:     Google account     Service account     Google group     G Suite domain     Cloud Identity domain Download the doc here – https://cloud.google.com/iam/docs/overview For more info… contact osazee@tiptechnologies.co.uk

Web application Vulnerability – 20/05/2019 150 150 tiptechnoloy_0sppo6

Web application Vulnerability – 20/05/2019

Web application Vulnerability is major puzzle in the security posture of an organization. The codes that run the application is the major focus of security. Even though an organization is technically/logically well protected against OWASP_Top_10 vulnerabilities, there will be security gaps that only the organization’s security culture can fill. Open Web Application Security Project (OWASP)…

The basic concepts of Cloud Identity and Access Management. – 15/05/2019 150 150 tiptechnoloy_0sppo6

The basic concepts of Cloud Identity and Access Management. – 15/05/2019

Google Cloud Platform (GCP) offers Cloud IAM, which lets you manage access control by defining who (identity) has what access (role) for which resource. Do you want more…? Contact us on osazee@tiptechnologies.co.uk.    

Identify Threats and Vulnerabilities with EDR and CASB in AWS 150 150 tiptechnoloy_0sppo6

Identify Threats and Vulnerabilities with EDR and CASB in AWS

*********** Sponsored By AWS Marketplace *********** Identify Threats and Vulnerabilities with EDR and CASB in AWS. Find out how these solutions help identify who has vulnerable software/configurations on their cloud endpoints by leveraging indicators of compromise to enrich investigations and pinpoint the depth and breadth of malware across thousands of endpoints. How to leverage endpoint…

TOP VULNERABILITY THIS WEEK – 08/02/2019 150 150 tiptechnoloy_0sppo6

TOP VULNERABILITY THIS WEEK – 08/02/2019

08/02/2019 TOP VULNERABILITY THIS WEEK: NetWire variants used in fake business spam campaign    

Cyber Security Statistics For Everyday People. Do You Know… 598 274 tiptechnoloy_0sppo6

Cyber Security Statistics For Everyday People. Do You Know…

In 2017 we have seen more focus on cybersecurity investment from healthcare providers. They’ve felt the pain of their antiquated systems and have had to step up out of necessity to do more to protect their infrastructures and patient data.” –Robert Herjavec, Founder & CEO, Herjavec Group Do You Know… 91 Percent of attacks by…

How to create Fortigate SSL VPN 534 500 tiptechnoloy_0sppo6

How to create Fortigate SSL VPN

How to create Fortigate SSL VPN SSL-VPN provides remote users with access to the corporate network using SSLVPN  client while connecting through the Internet to the corporate FortiGate unit. During the connecting phase, the FortiGate unit will also verify that the remote user’s antivirus software is installed and current… Step 1. Create an SSL VPN portal…

How to configure Wired 802.1x 600 303 tiptechnoloy_0sppo6

How to configure Wired 802.1x

How to configure Wired 802.1x on ISE 1.3… 1. Add an external identity source e.g. AD If you have multiple identity sources, create an identity source sequence Add ISE(s) as join points to AD Add AD OUs as groups To enable machine authentication; go to Administration, external ID sources, Advance settings – Tick the check…