https://www.csoonline.com/article/3285982/data-protection/4-reasons-why-cisos-must-think-like-developers-to-build-cybersecurity-platforms.html
https://www.csoonline.com/article/3287655/phishing/stop-training-your-employees-to-fall-for-phishing-attacks….
3 Summer Safety Reminders for Families
For many children, summertime is the best time of the year. No more school, ice cream and popsicles and – did we mention – no more school? However, if you are a parent, summertime presents more of a challenge. From trying to organize activities and bab…
What is the difference between IP and CCTV cameras?
When it comes to installing security cameras in your home or place of business, there are two main types of technology you’ll want to consider: internet protocol (IP) cameras or closed-circuit television (CCTV) cameras. Let’s look at the difference between IP and CCTV cameras. For decades, analogue CCTV cameras have dominated the market, but with […]
The post What is the difference between IP and CCTV cameras? appeared first on Assured Security Solutions.
Secure Kali Pi 2018
We have covered how to create secure “throw-away hack boxes” using the Raspberry Pi before, but we thought it was time to go back and take a look at the process again. With all the new Raspberry Pi models and Kali changes from when we last …
A Trillion $ Cyber Security Question for Microsoft and CISOs Worldwide
Folks,
Today, to give a hint for the answer to this 1 question, I asked possibly the most important cyber security question in the world, one that directly impacts the foundational security of 1000s of organizations worldwide, and thus one that impact…
Happy 4th of July!
Folks,
Here’s wishing you all a very Happy Fourth of July! Hope you have a great one!
I was supposed to answer a certain question today, but I decided to take the day off, so I’ll answer it in days to come.
Best wishes,
Sanjay.
Mimikatz DCSync Mitigation
Folks,
A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here –
Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the …
Defensive Security Podcast Episode 221
https://www.esecurityplanet.com/network-security/security-projects-cisos-should-consider-gartner.html
https://www.canadianunderwriter.ca/legal/data-breach-defendant-must-hand-computer-forensics-reports-court-1004133756
https://www.theregister.co.uk/201…
Respecting Historical Properties: Tips for Security without Impacting Integrity
Do you own a historical piece of property you have transformed into your business or office? If so, there’s a good chance you want to secure the space. However, did you know there are steps you can take to do this without ruining the historical integri…
WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?
Folks,
Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.
Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask lik…