Secure Kali Pi 2018

We have covered how to create secure “throw-away hack boxes” using the Raspberry Pi before, but we thought it was time to go back and take a look at the process again. With all the new Raspberry Pi models and Kali changes from when we last …

Read More >>

Happy 4th of July!

Folks,

Here’s wishing you all a very Happy Fourth of July!  Hope you have a great one!

I was supposed to answer a certain question today, but I decided to take the day off, so I’ll answer it in days to come.

Best wishes,
Sanjay.

Read More >>

Mimikatz DCSync Mitigation

Folks,

A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here  –

Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the …

Read More >>

Defensive Security Podcast Episode 221

https://www.esecurityplanet.com/network-security/security-projects-cisos-should-consider-gartner.html
https://www.canadianunderwriter.ca/legal/data-breach-defendant-must-hand-computer-forensics-reports-court-1004133756
https://www.theregister.co.uk/201…

Read More >>

WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?

Folks,

Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.

Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask lik…

Read More >>

Defensive Security Podcast Episode 220

https://www.wired.com/story/exactis-database-leak-340-million-records/
https://www.helpnetsecurity.com/2018/06/19/opm-breach-fraud/
https://www.tenable.com/blog/should-you-still-prioritize-exploit-kit-vulnerabilities
 

Read More >>