Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV
This post is part of a series on securing your endpoints against cyber attacks.Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our ... Read More
Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part III
This post is part of a series on securing your endpoints against cyber attacks.Read: Part I | Part II | Part III | Part IV Coming Soon How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post ... Read More
Protecting IoT and Machine Identities (IDs) with Automated PAM Tools
The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities. Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The ... Read More
Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks
Approx. reading time: 8-10mins This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD) ... Read More
Enterprise Endpoint Management is a must when all users are privileged users
A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s ... Read More
SolarWinds Sunburst: One of the biggest cyber attacks targeting the software industry supply chain in history
Over the past weeks, we’ve learned more about one of the biggest cyber attack on the software industry supply chain. This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most ... Read More
Top 5 Hacking and Cyber Security Books of 2020
Continuous learning is a top priority for me. It’s critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading ... Read More
Hardening Windows Endpoints Against Cyber Attack: Part II
In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack. Step 0: Pre-Engagement Step 1: Passive Recon Step 2: Active Recon Now the run really begins. In this blog post, you’ll learn how to put all the ... Read More
Hardening Windows Endpoints Against Cyber Attack: Part I
To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access to sensitive information. As part of the ethical hacking ... Read More
Cyber Security Trends and Predictions for 2021, and Reflections on 2020
Well, 2020 was surely a year to remember—or one that most of us will want to forget. No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly ... Read More