hello again

Tag Archives: #hackerspace

#cybersecurity | #hackerspace | RADIUS Server in Azure – Security Boulevard

Source: National Cyber Security – Produced By Gregory Evans Azure® is a cloud infrastructure provider that offers compute, storage, and other infrastructure platforms, such as Office 365. Azure introduced its own identity management solution called Azure Active Directory® (AD), but this doesn’t serve as a solution for bringing the on-prem directory service, Active Directory, to […]

#cybersecurity | #hackerspace | Security @ Serverless Speed – A Protego Use Case

Source: National Cyber Security – Produced By Gregory Evans Companies choose to transition to serverless computing for various reasons, mainly being faster time-to-market and reduced infrastructure costs. However, the root cause of their serverless security needs differ based on a myriad of factors. In this use case we will highlight a team struggling with traditional […]

#cybersecurity | #hackerspace | Derbycon2019, Brett Hawkins’ ‘SharPersist: Windows Persistence Toolkit In C#’

Source: National Cyber Security – Produced By Gregory Evans Many Thanks to Adrian Crenshaw (Irongeek), and his Videographer Colleagues for Sharing His and Their Outstanding Videos Of This Last And Important DerbyCon 2019. Visit Irongeek for additional production credits and additional information. Subscribe to Irongeek’s content, and provide Patreon support as well. Permalink The post […]

#cybersecurity | #hackerspace | Why Cybersecurity Breach Survivors are Valued Assets

Source: National Cyber Security – Produced By Gregory Evans Guest article By Ewen O’Brien, VP of Enterprise, EMEA at BitSightNo one wants to talk about their failures, especially in the cybersecurity realm where the stakes are high. But new insight from Symantec and Goldsmiths, University of London, finds that security professionals who have lived through a […]

#cybersecurity | #hackerspace | Isolation protects you from threats that haven’t even been discovered

Source: National Cyber Security – Produced By Gregory Evans Another day, another validation that Internet isolation really is the best cybersecurity protection out there. Last week, Google released an urgent Chrome update to patch an actively exploited zero-day known as CVE-2019-13720, a memory corruption bug that uses a use-after-free vulnerability in audio that allows a […]

#cybersecurity | #hackerspace | Maze Ransomware Exploiting Exploit Kits

Source: National Cyber Security – Produced By Gregory Evans Cybercrime has never been one to hem in tactics with ideology or rules. Rather, malware operators are known to use what works and then modify code to continue to work. By “work,” we mean that the code does what it is supposed to; for information stealers, […]

#cybersecurity | #hackerspace | Active Directory Fix-It Guide – Security Boulevard

Source: National Cyber Security – Produced By Gregory Evans IT admins have long been the unofficial repair technicians of the enterprise. However, instead of hammers and wrenches, the tool kit of the IT admin contains servers, cables, and software tools. Unfortunately, one of the most popular IT admin tools, Microsoft® Active Directory® (AD), isn’t working […]

#cybersecurity | #hackerspace | Why PAM Should Be a CISO’s Top Priority

Source: National Cyber Security – Produced By Gregory Evans Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an appropriate level of privileged access controls, PAM helps organizations condense their organization’s attack surface […]

#cybersecurity | #hackerspace | Analyst Discusses Reporting Hack Of Computer System At Indian Nuclear Reactor | Avast

Source: National Cyber Security – Produced By Gregory Evans This week a report of hackers gaining access to an Indian nuclear power plant’s computer network led to alarm, confusion, and denial before officials admitted the hack took place. The threat analyst who reported the issue experienced a unique vantage point in the middle of that […]

#cybersecurity | #hackerspace | State of Serverless and Security

Source: National Cyber Security – Produced By Gregory Evans Trends in Serverless Adoption Serverless adoption has been increasing drastically over the past 18 months- outpacing other cloud infrastructure environments. Given this, Protego Labs has surveyed top security, development, and DevOps professionals from over 30 organizations to get their perspective on serverless adoption and the role […]

#cybersecurity | #hackerspace | Make Active Directory Work in the Cloud Era

Source: National Cyber Security – Produced By Gregory Evans Cloud resources have revolutionized the way we do work today. Offices are more mobile, giving employees access to critical resources anywhere, at any time. This enables them to get work done at a faster rate than people could just 20 years ago. In addition, the quality […]

#cybersecurity | #hackerspace | Making a Case for Tokenization in the Enterprise

Source: National Cyber Security – Produced By Gregory Evans Tokenization can be used to protect any sensitive data within an organization, with little overhead One of the most difficult tasks in information security is protecting sensitive data across complex, distributed enterprise systems as well as a mix of legacy systems and cloud-based applications, all blended […]