We have covered how to create secure “throw-away hack boxes” using the Raspberry Pi before, but we thought it was time to go back and take a look at the process again. With all the new Raspberry Pi models and Kali changes from when we last …
A Trillion $ Cyber Security Question for Microsoft and CISOs Worldwide
Folks,
Today, to give a hint for the answer to this 1 question, I asked possibly the most important cyber security question in the world, one that directly impacts the foundational security of 1000s of organizations worldwide, and thus one that impact…
Happy 4th of July!
Folks,
Here’s wishing you all a very Happy Fourth of July! Hope you have a great one!
I was supposed to answer a certain question today, but I decided to take the day off, so I’ll answer it in days to come.
Best wishes,
Sanjay.
Mimikatz DCSync Mitigation
Folks,
A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here –
Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the …
Defensive Security Podcast Episode 221
https://www.esecurityplanet.com/network-security/security-projects-cisos-should-consider-gartner.html
https://www.canadianunderwriter.ca/legal/data-breach-defendant-must-hand-computer-forensics-reports-court-1004133756
https://www.theregister.co.uk/201…
Respecting Historical Properties: Tips for Security without Impacting Integrity
Do you own a historical piece of property you have transformed into your business or office? If so, there’s a good chance you want to secure the space. However, did you know there are steps you can take to do this without ruining the historical integri…
WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?
Folks,
Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.
Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask lik…
US Army executes active electronic attack in Europe for first time since Cold War
Operators, and even commanders, are cutting their teeth in the electromagnetic spectrum using the Army’s rapidly developed EW prototypes in Europe.
Defensive Security Podcast Episode 220
https://www.wired.com/story/exactis-database-leak-340-million-records/
https://www.helpnetsecurity.com/2018/06/19/opm-breach-fraud/
https://www.tenable.com/blog/should-you-still-prioritize-exploit-kit-vulnerabilities
Delay for proposed DISA elimination clears key hurdle
A Maryland congressman is working to thwart a proposal to ax DISA.