Active Directory is becoming more complicated as new AD options for hybrid and connected directory models have become available for hybrid setups on Azure. | Continue reading
Cybersecurity jargon can be confusing, but it's imperative that every member of your organization — not just the IT department — understands what they mean. In this article, we explain how to translate 10 cybersecurity buzzwords for everyone in your office. | Continue reading
According to myth, Kerberos (you might know him as Cerberus) guards the Gates to the Underworld. He’s a big 3 headed dog with a snake for a tail and a really bad temper. In the modern world, MIT Computer Scientists used the name and visual of Kerberos for their computer network a … | Continue reading
The number of lost or stolen data records varies around the world. Using data from the Breach Level Index, we visualized where these records are concentrated based on the locations of the organizations that reported them. Take a look! | Continue reading
Last time, we saw how sneaky hackers can copy malware into the Alternate Data Stream (ADS) associated with a Windows file. I showed how this can be done with the ancient type command. As it turns out, there are a few other Windows utilities that also let you copy into an ADS. For … | Continue reading
Have I mentioned recently that if you’re following the usual data security standards (NIST, CIS Critical Security Controls, PCI DSS, ISO 27001) or common sense infosec principles (PbD), you shouldn’t have to expend much effort to comply with the General Data Protection Regulation … | Continue reading