Avatar photo
By: Raul Mahiques

February 15, 2023 6:17 pm

5,271 views

Ransomware Attacks – Part 3, Container Security

Table of Contents 1. Introduction 2. How do we protect Kubernetes environments? 3. Why use Zero-Trust policies to stop the spread of malware? 4. The importance of having a secure software supply chain? 5. Why must we automate security in Kubernetes environments? 6. How can we scale these measures when we have multiple clusters? 7. […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm

4,874 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 10:37 am

5,380 views

Ransomware Attacks – Part 1, Introduction

In this series of articles, I will talk about Ransomware attacks and how we can better protect our systems. What is ransomware? Ransomware is a type of malicious software (malware) that is designed to block access to a computer system or its data, usually by encrypting it, until a ransom is paid. It is typically […]

Read More


Avatar photo
By: Raul Mahiques

January 4, 2023 4:24 pm

6,160 views

Another Orchestrated Attack: How Do I Protect Myself?

Criminal groups are always trying to make money by taking advantage of software vulnerabilities. In many organizations, it is difficult for security teams to keep up with attacks due to challenges on many fronts, including: New vulnerabilities discovered every day: There are always new vulnerabilities that need to be patched in the libraries and applications […]

Read More