Virtual patching

Virtual patching is the process of creating a software patch without having to modify or recompile the original code. This can be done by using a tool that inserts code into the software at runtime, or by using a tool that modifies the software’s binaries. Virtual patching can be used to fix security vulnerabilities, or … Read more

TCP Wrapper

A TCP wrapper is a software utility that provides network security by allowing or denying access to a system via TCP/IP. It uses a configuration file (usually /etc/hosts.allow and /etc/hosts.deny) to control access to services such as FTP, SSH, and email servers. TCP wrappers can be used to protect against a variety of attacks, including … Read more

ICS security (industrial control system security)

Industrial control system security, also known as ICS security or SCADA security, is the security of industrial control systems, such as supervisory control and data acquisition (SCADA) systems, process control systems and distributed control systems. These systems are used to control and monitor industrial processes, such as power generation, water and waste treatment, oil and … Read more