Learning & Resource Center

 

 

Immediate Assistance(800) 989-2647

Videos

Recent Posts

IP Subnet Sheet

Have you ever wondered what is a /27?  Or how many IP addresses do I get to use with a /28?  Is there a use for a /31?  CIDR Subnet Mask Total IPs Usable IPs /32 255.255.255.255 1 1 /31 255.255.255.254 2 0* /30 255.255.255.252 4 2 /29 255.255.255.248 8 6 /28...

Agile Modeling

Agile Modeling (AM) is a practice-based methodology for effective modeling and the documentation of software-based systems.  Agile Modeling (AM) is a collection of values, principles, and practices for modeling software that can be applied on a software development...

Securing Your MongoDB

Securing your MongoDB Securing MongoDB must be a top priority for system administrators right now as ransom attacks are on the rise.  If you are using MongoDB to storing data on any public facing cloud server running on Linux, then you will need to make sure you lock...

Adaptive Software Development

Adaptive Software Development is part 1 of our 12 Principles of Agile Development series. Adaptive software development (ASD) is a software development process that grew out of the rapid application development work by Jim Highsmith and Sam Bayer. ASD is centered...

Vulnerability Feed

CVE-2019-10406 (jenkins)

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2013-2157 (keystone)

OpenStack Keystone Folsom, Grizzly before 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote attackers to bypass authentication via an empty password.

CVE-2008-3872 (flash_player)

Adobe Flash Player 8.0.39.0 and earlier, and 9.x up to 9.0.115.0, allows remote attackers to bypass the allowScriptAccess parameter setting via a crafted SWF file with unspecified "Filter evasion" manipulations.

NIST News

5616: Internal Auditing Best Practices

This 2 hour webinar will consider internal auditing techniques and best practices that are used by a metrology laboratory to comply with ISO/IEC 17025:2017 criteria. There are no prerequisites for this webinar.

SANS ISC Bulletins