dcsimg

ISO 27001 Webinar – How to overcome you data security compliance challenges

ISO 27001 certification demonstrates to existing and potential customers that an organisation has defined and put in place best-practice information security processes. ISO 27001 is the only auditable international standard that defines the requirements of an ISMS (information security management system). An ISMS is a set of policies, procedures and systems that manage information risks, such as … [Read more...]

Introducing Privileged Access Management that fits your Bandwidth, Budget and Small Business

Thycotic has just introduced Secret Server Vault—a privileged access management (PAM) solution specifically designed for small to medium size businesses and department-level teams. There are a several big reasons why Secret Server Vault makes sense for SMBs like yours. First and foremost, no matter the size of your business you need enterprise-grade PAM protection. That’s because privileged … [Read more...]

Cybercrime tactics & techniques Q2 2018

A generally slow quarter reflects an overall lull in cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback. In nearly every malware category for both business and consumer detections, we saw a decrease in volume, corroborating our general “Dang, it’s been a … [Read more...]

Thycotic Continues to Deliver Record Breaking Sales Growth in Q2 2018

Stellar Quarter Driven by Strong Adoption of Innovative PAM Technology, High Customer Satisfaction and Analyst Recognition WASHINGTON, D.C., July 17, 2018 — Thycotic, provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, completed a highly successful quarter – setting a higher benchmark in terms of new customer acquisition, existing … [Read more...]

The Complete Guide to Azure Virtual Machines: Part 2

Our Azure Virtual Machines guide continues this time explaining how to create a network security group and begin to deploy Virtual Machines under Azure. Read the post here: The Complete Guide to Azure Virtual Machines: Part 2 … [Read more...]

The DPO role and why you should consider outsourcing it

Under the EU GDPR (General Data Protection Regulation), which came into force on 25 May 2018, certain organisations are required to appoint a DPO (data protection officer). An organisation is required to appoint a designated DPO where it is a public authority or body, or where its core activities consist of either: Data processing operations that require regular and systematic monitoring of data … [Read more...]

How to Create a Parallels RAS Template

How to Create a Parallels RAS Template  Parallels RAS can automatically generate and deploy two types of templates on demand using configurable RAS Templates: one for VDI desktops and another one for RD session hosts. This allows administrators to create and deploy guest virtual machines on the fly, saving a great deal of time. Follow these steps to deploy a RAS Template using Parallels RAS.  1. … [Read more...]

Magniber ransomware improves, expands within Asia

This blog post was authored by @hasherezade and Jérôme Segura. The Magnitude exploit kit is one of the longest-serving browser exploitation toolkits among those still in use. After its inception in 2013, it enjoyed worldwide distribution with a liking for ransomware. Eventually, it became a private operation that had a narrow geographic focus. During 2017, Magnitude delivered Cerber ransomware via … [Read more...]

A week in security (July 9 – July 15)

Last week, we talked about domestic abuse fuelled by IoT, doing threat intel programs right, blocking ICO fraud, and man-in-the-middle attacks. We also explained why we block shady ad blockers and provided tips to online shoppers for Prime Day. Other news: Reports revealed that low-end Android devices sold in Egypt, Brazil, South Africa, Myanmar, and other developing markets contain pre-installed … [Read more...]

Windows PowerShell: Automating common admin tasks

Back in 2012, I wrote a number of blog posts that highlighted the efficacy of PowerShell and how it could be used to make your life as a sysadmin easier. This article builds on Windows PowerShell: Extracting Strings Using Regular Expressions, Windows PowerShell: Essential Admin Scripts (Part 1), and Windows PowerShell: Essential Admin Scripts (Part […] … [Read more...]