SIEM: A rose by any other name

What is a CASB (Cloud Access Security Broker)?

Cloud access security brokers (CASB) are on-premises or cloud-hosted software that sit between cloud service consumers and cloud service providers to enforce security, compliance, and governance policies for cloud applications. CASBs help organizations extend the security controls of their on-premises infrastructure to the cloud.


Amazon CloudFront and HTTP/2

HTTP/2 is a major revision of the HTTP protocol. This new version has several features that make page loading and rendering faster.
·Multiplexing allows multiple requests and response messages between the client and Amazon CloudFront to be in flight at the same time over a single connection, instead of multiple connections, which improves page load times. ·Header compression reduces the overhead bytes downloaded by the client, helping get the content to the viewer sooner. This is especially useful for mobile clients that are already constrained on bandwidth. ·Stream priority, allows for quicker page rendering by enabling the client to control the order in which web assets are delivered, thereby optimizing user experience.
HTTP/2 is enabled by default for all new Amazon CloudFront distributions, and for existing distributions HTTP/2 can be enabled by editing the distribution configuration. There is no additional charge for using this feature, and clients that do not support HTTP/2 will s…

MySQL - Get size of table

Get the Size of all tables in a database

select table_name, round(((data_length + index_length) / (1024*1024)),2) as 'size in megs' from information_schema.tables where table_schema = 'the_name_of_my_db';

Get the Size of a specific table in a database

select table_name, round(((data_length + index_length) / (1024*1024)),2) as 'size in megs' from information_schema.tables where table_schema = 'the_name_of_my_db' AND table_name = 'the_name_of_my_table';

The name "table_schema" is a bit misleading, in fact  you have to specify the database name.


Vulnerability Scanning - authenticated scan vs unauthenticated

Imagine you have the choice between opening a box and looking inside, or shaking and prodding it from the outside to guess what it may contain. Imagine further, that if you are unable to successfully guess the contents of the box, something bad may happen, something damning, damaging or dangerous. Which of the two choices would you decide to take?
Unauthenticated testing alone will not fully simulate targeted attacks on your application or system. Although unauthenticated scans will show weaknesses in your perimeter, it will not show you what the attacker will exploit once breaching your perimeter: weaknesses within your network.
Authenticated scans allow vulnerability scanners to use privileged credentials to dig deeper into a network and detect threats around weak passwords, malware, installed applications, and configuration issues. They are able to simulate what a user of the system can actually do. By finding and fixing internal security holes, you can prevent an attacker who breac…

Profitable SaaS Ideas

The way to get profitable startup idea is not to try to think of startup ideas (including SaaS development). It's to look for problems, preferably problems you have yourself.

In fact, for many entrepreneurs, successful business ideas start out as solutions designed to address a challenge they face personally. Solving the problem that frustrates you may be one of the best ways of finding an idea for your startup. Look at these software developers who turned their problem into success.


Install fortune & cowsay to give some life to your terminal

I have tested on Centos 7

yum install cowsay.noarch

yum install fortune-mod.x86_64

[root@localhost ~]# vim .bash_profile
Add the following line
fortune | cowsay

Let's try it.

[vicky@localhost ~]$ su - Password: Last login: Fri Aug  3 18:21:46 MUT 2018 on pts/2  ____________________________________ / Be consistent.                     \ |                                    | \ -- Larry Wall in the perl man page /  ------------------------------------         \   ^__^          \  (oo)\_______             (__)\       )\/\                 ||----w |                 ||     || [root@localhost ~]#