Essentials to Consider When Backing up Data

5 Essentials to Consider When Backing up Your Data

Data backup is very crucial for any business. It’s been said that a company is as good as the quality of its data backup plan. In a perfect world, if you have ...
Security Boulevard
Windows® Domain Controller and Zero Trust Security

Windows® Domain Controller and Zero Trust Security

There’s a new security model being adopted in the IT world these days. It is known as Zero Trust Security, and you can see its instantiation in models such as Google® BeyondCorp ...
Skype End-to-End Encryption

French Government Open Sources Secure Operating System

The French government’s national cybersecurity agency has released an operating system built using open source components internally over the course of more than 10 years for use by the French administration. Dubbed ...
Security Boulevard
Recovering data from an old encrypted Time Machine backup

Recovering data from an old encrypted Time Machine backup

| | forensics, macos, NAS, time capsule, time machine
Recovering data from a backup should be an easy thing to do. At least this is what you expect. Yesterday I had a problem which should have been easy to solve, but ...
User Access Management for Samba File Servers and NAS Devices

User Access Management for Samba File Servers and NAS Devices

User access management for Samba file servers and NAS devices is one of many identity management challenges facing modern IT organizations. The popularity of these network-attached storage devices has grown significantly in ...
Malware hits 500k IoT devices, Talos reports

Malware hits 500k IoT devices, Talos reports

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier ...
Researcher finds hardcoded backdoor in Western Digital storage devices

Researcher finds hardcoded backdoor in Western Digital storage devices

Western Digital network attached storage (NAS) devices have been found vulnerable to remote exploitation that would allow bad actors to download your private files at will. Security researcher James Bercegay reveals in ...