Defensive Security Podcast Episode 222

https://www.csoonline.com/article/3285982/data-protection/4-reasons-why-cisos-must-think-like-developers-to-build-cybersecurity-platforms.html
https://www.csoonline.com/article/3287655/phishing/stop-training-your-employees-to-fall-for-phishing-attacks….

Read More >>

3 Summer Safety Reminders for Families

For many children, summertime is the best time of the year. No more school, ice cream and popsicles and – did we mention – no more school? However, if you are a parent, summertime presents more of a challenge. From trying to organize activities and bab…

Read More >>

What is the difference between IP and CCTV cameras?

When it comes to installing security cameras in your home or place of business, there are two main types of technology you’ll want to consider: internet protocol (IP) cameras or closed-circuit television (CCTV) cameras. Let’s look at the difference between IP and CCTV cameras. For decades, analogue CCTV cameras have dominated the market, but with […]

The post What is the difference between IP and CCTV cameras? appeared first on Assured Security Solutions.

Read More >>

Secure Kali Pi 2018

We have covered how to create secure “throw-away hack boxes” using the Raspberry Pi before, but we thought it was time to go back and take a look at the process again. With all the new Raspberry Pi models and Kali changes from when we last …

Read More >>

Happy 4th of July!

Folks,

Here’s wishing you all a very Happy Fourth of July!  Hope you have a great one!

I was supposed to answer a certain question today, but I decided to take the day off, so I’ll answer it in days to come.

Best wishes,
Sanjay.

Read More >>

Mimikatz DCSync Mitigation

Folks,

A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here  –

Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the …

Read More >>

Defensive Security Podcast Episode 221

https://www.esecurityplanet.com/network-security/security-projects-cisos-should-consider-gartner.html
https://www.canadianunderwriter.ca/legal/data-breach-defendant-must-hand-computer-forensics-reports-court-1004133756
https://www.theregister.co.uk/201…

Read More >>

WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?

Folks,

Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.

Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask lik…

Read More >>