Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Amos Kingatua
Total 27 articles
Amos Kingatua is an ICT consultant and technical writer who assists businesses to set up, secure, and efficiently run a wide range of in-house and virtual data centers, IT systems and networks.
Privilege escalation attacks occur when bad actors exploit misconfigurations, bugs, weak passwords, and other vulnerabilities that allow them to access protected assets.
Identify and remediates misconfiguration issues and risk in the cloud infrastructure using Cloud Security Posture Management (CSPM). Read on to know more.
Want to deploy an effective strategy to save your organization from cyberattacks? Explore cyber resilience strategy, benefits, learning resources, and more.
Data management refers to the combination of concepts, procedures, processes, and practices as well as the associated systems that give an organization the ability to optimize its data resources.
The pfSense software is an open-source firewall and router solution based on the FreeBSD operating system. Suitable for small and mid-range companies, the pfSense provides a low cost, dedicated firewall, and router solution for physical and virtual computer networks.
As networking continue to evolve and increase in size, the configurations are becoming more complex and challenging to manage using conventional manual methods.
Penetration testing is the process of practically assessing security vulnerabilities in applications to establish if attackers can exploit them and compromise the systems.
In a cloud data storage, where the IT team has no control over where the data is stored by the cloud provider, a robust data protection system is a must.
The Linux find command is a powerful tool that enables system administrators to locate and manage files and directories based on a wide range of search criteria. It can find directories and files by their name, their type, or extension, size, permissions, etc.
Incident response tools identify, prevent, and respond to various security threats and attacks targeting your ICT systems. Here are some of the best tools.
A redaction software is a tool that can search and remove text, images, audio, and other content containing private, sensitive, or confidential information.
Security, Orchestration, Automation, and Response (SOAR) tools are software products that enable IT teams to define, standardize and automate the organization’s incident response activities. Most organizations use these tools to automate security operations and processes, respond to incidents, and manage vulnerabilities and threats.
An extended detection and response (XDR) solution combines security tools that monitor, detect, and respond to a wide range of threats across various layers of an IT infrastructure.
A man-in-the-middle (MITM) attack is when a bad actor interrupts an established network conversation or data transfer. The attacker sits in the middle of the transfer path and then pretends or act as a legitimate participant in the conversation.
Power Your Business
Some of the tools and services to help your business grow.
Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.