Mimikatz DCSync Mitigation

Folks,

A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here  –

Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the …

Read More >>

Defensive Security Podcast Episode 221

https://www.esecurityplanet.com/network-security/security-projects-cisos-should-consider-gartner.html
https://www.canadianunderwriter.ca/legal/data-breach-defendant-must-hand-computer-forensics-reports-court-1004133756
https://www.theregister.co.uk/201…

Read More >>

WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?

Folks,

Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.

Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask lik…

Read More >>

Defensive Security Podcast Episode 220

https://www.wired.com/story/exactis-database-leak-340-million-records/
https://www.helpnetsecurity.com/2018/06/19/opm-breach-fraud/
https://www.tenable.com/blog/should-you-still-prioritize-exploit-kit-vulnerabilities
 

Read More >>

We Are Akamai: What Led Us Here

About Akamai and the blog We are the people at the heart of the internet. Every day, we work together to protect our customers, deliver ultimate experiences in the digital world, and connect people from far corners of the planet….

Read More >>

Defensive Security Podcast Episode 219

https://www.csoonline.com/article/3276584/ransomware/what-does-a-ransomware-attack-cost-beware-the-hidden-expenses.html
https://www.bankinfosecurity.com/mental-health-provider-pays-ransom-to-recover-data-a-11040
https://www.itbusinessedge.com/blogs/dat…

Read More >>

Alarming! : Windows Update Automatically Downloaded and Installed an Untrusted Self-Signed Kernel-mode Lenovo Driver on New Surface Device

Folks,

Given what it is I do, I don’t squander a minute of precious time, unless something is very important, and this is very important.

Let me explain why this is so alarming, concerning and so important to cyber security, and why at many organi…

Read More >>