Data security and privacy compliance and competitiveness are one in the same for law firms.
toolsmith #130 – OSINT with Buscador
First off, Happy New Year! I hope you have a productive and successful 2018. I thought I’d kick off the new year with another exploration of OSINT. In addition to my work as an information security leader and practitioner at Microsoft, I am privilege…
2017 – The Year The World Realized the Value of Active Directory Security
Folks,
As we get ready to bid farewell to 2017, it may be fitting to recap notable happenings in Active Directory Security this year.
This appears to have been the year in which the mainstream Cyber Security community finally seems to have realized j…
Why I Do, What I Do
Folks,
I trust you’re well. Today, I just wanted to take a few minutes to answer a few questions that I’ve been asked so many times.
Here are the answers to the Top-5 questions I am frequently asked –
You’re the CEO of a company (Paramount Defen…
Blackhat Europe 2017 – conference notes
I had the pleasure to attend the Blackhat Europe 2017 in London – and it was enlightening! In this post, I shall provide links to the slide decks, videos and tools shared during the demonstrations, briefings and various talks. The abstracts for t…
Your Holiday Home Security To-Do List 2017, Part 2: Advanced Protection & Tips
In last month’s Part 1 of this series, we reviewed some of the more basic home security tips you should pay attention to this holiday season […]
The post Your Holiday Home Security To-Do List 2017, Part 2: Advanced Protection & Tips appeared first on Charleston Security Systems.
DEMANDS ON ETHICAL HACKERS ARE RAPIDLY GROWING
SINGAPORE:
The Ministry of Interior and Defence (Mindef) will be inviting about 300
international and local hackers to hunt for vulnerabilities in its
Internet-connected systems next year (2018), in a bid to guard against
ever-evolving cyber threat…
Netcat-TCP/IP Swiss Army Knife.
Netcat(popularly known as NC) is feature-rich network debugging and investigation tool with tons of built-in capabilities for reading from and writing to network connections using TCP or UDP. Its Plethora of features includes port listening, port scanning & Transferring files due to which it is often used by Hackers and PenTesters as Backdoor. Netcat was … Continue reading Netcat-TCP/IP Swiss Army Knife.
5 Important Reasons To Buy Local When It Comes To Home Security
When you hear the term “Buy Local” many different kinds of businesses come to mind like restaurants, retail stores and other product & service businesses, however […]
The post 5 Important Reasons To Buy Local When It Comes To Home Security appeared first on Charleston Security Systems.
Paramount Privileged Account Security Guidance (101) for CyberArk
Shadow Admins – The Stealthy Accounts That You Should Fear The Most, but Needn’t Anymore
Folks,
Today’s post concerns CyberArk’s guidance on Privileged Account Security, a subject that is paramount to cyber security today, and it likely impacts Tri…