Skip to content
Cubed Corps

Cubed Corps

CubedCorps helps small and medium-sized businesses comply with clients, insurance companies, and relevant frameworks to mitigate cyber security risks by providing cyber-security consulting services.

952.334.5458 or 612.201.6845 info@cubedcorps.com
Menu
  • Home
  • Computer Recycling
  • Risk Assessment
  • Physical Security
  • Location
  • About
  • Blog

Category: IT solutions

How to Update OpenVAS data feeds in Ubuntu 18.04

1 Comment
| IT solutions, Security

I am documenting how to update the Greenbone Security Scanner feed in OpenVAS running on Ubuntu 18.04.  OpenVAS is a great tool for scanning your system for known vulnerabilities. How to manually update the Security Scanner Feed sudo systemctl stop openvas-scanner sudo systemctl stop openvas-manager sudo greenbone-nvt-sync sudo greenbone-certdata-sync sudo greenbone-scapdata-sync sudo systemctl start openvas-scanner […]

Read More »

ISO 27001 Implementation Can Create Imperfect Security

No Comments
| Guides, IT solutions

I have been in the Information security sector informally for many years, and in the past 5 years, much more formally.  I have used mostly NIST and ISO 27001 frameworks for clients although I have used others like PCI and Cobit.  I like the framework that ISO 27001 and supporting ISO documentation (ISO 27002-5), especially […]

Read More »

What is a Red Team?

No Comments
| IT solutions, Security

Have you ever been sitting, maybe waiting for an appointment at a company and watched people interacting with each other? Have you looked at door locks and wondered if you could open them? Have you ever sat in a lobby with open Ethernet ports and wondered what would happen if you plugged your computer into […]

Read More »

OpenVAS Musings

No Comments
| IT solutions, Security, Tech News

First off, if you are reading this blog and wondering what OpenVAS is, take a look at their website. OpenVAS product is a vulnerability scanner.  OpenVAS does much of the same things that Nessus does, Nessus split away from the original code base years ago and provides a paid version.  Nessus is a great alternative […]

Read More »

What is OWASP?

No Comments
| IT solutions, Security

At its most basic OWASP stands for Open Web Application Security Project.  Many people that I work with or do business with have never heard of this organization.  The first issue is that OWASP is an open worldwide community of security professionals.  I do not think there are many security professionals that are also good solid […]

Read More »

SQL Server – “Cannot shrink log file because the logical log file located at the end of this file is in use”

No Comments
| IT solutions

As an occasional DBA and full time troubleshooter, I have had a number of complex interactions with SQL server. Most of the time, I do not blog about them, In this instance I decided to document the solution to this problem for everyone, but also in case I need it again in the future. I […]

Read More »

The U.K. Cyber Essentials Security Scheme

No Comments
| Guides, IT solutions, Tech News

The U.K. Cyber Essentials Security Scheme – a useful framework for small businesses in other countries! In October 2014 the UK government created a low-cost, light-touch scheme called Cyber Essentials. It doesn’t introduce new concepts, controls or processes. It takes items from existing standards such as the ISO 27000 and NIST SP 800-53 publications and […]

Read More »

How to Check Windows Active Directory for Problems

No Comments
| Guides, IT solutions

Having helped many small organizations troubleshoot problems with Microsoft Active Directory, I thought I would put a few of my favorite trouble shooting tips and tricks in a blog for reference and for my later reference. First: how do you determine that something may be wrong with the current active directory configuration? Here are a […]

Read More »

How to create a great security policy template!

No Comments
| Guides, IT solutions

I was looking back at some of my very early policy that I wrote back in 2004. After reviewing some of my initial policy, I realized that creating a good policy can be a hard thing to perform correctly the first time.   I decided to help people new to policy writing by outlining a template […]

Read More »

How to create and enhance security policies for your business!

No Comments
| Guides, IT solutions

As more and more businesses are either voluntarily or forced to increase their security posture, the first step is developing and documenting good security policy and procedure.  There are only a few times where I have not performed this essential step before making changes to the environment.  Writing security policy is a large task that […]

Read More »

Posts pagination

1 2 Next

Archives

  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • October 2020
  • August 2019
  • July 2019
  • January 2019
  • December 2018
  • July 2018
  • November 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2017
  • February 2017
  • September 2016
  • June 2016
  • May 2016
  • April 2016
  • September 2015
  • August 2015
  • July 2015

Meta

  • Log in

Cubed Corps 2025 . Powered by WordPress

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT