dcsimg

Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and protecting endpoints. In Part I, Hardening Endpoints Against Cyber Attack, we covered these … [Read more...]

Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part III

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV Coming Soon How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and protecting endpoints. In Part I, Hardening Endpoints Against Cyber Attack, we covered … [Read more...]

Protecting IoT and Machine Identities (IDs) with Automated PAM Tools

The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities.  Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The proliferation of connected devices and automation is … [Read more...]

Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks

Approx. reading time: 8-10mins  This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD). Active Directory is deployed across many … [Read more...]

Enterprise Endpoint Management is a must when all users are privileged users

A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential on a home desktop, laptop, or mobile … [Read more...]

SolarWinds Sunburst: One of the biggest cyber attacks targeting the software industry supply chain in history

Over the past weeks, we’ve learned more about one of the biggest cyber attack on the software industry supply chain.  This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words during the CES technology trade show keynote should not be taken casually.  … [Read more...]

Top 5 Hacking and Cyber Security Books of 2020

Continuous learning is a top priority for me.  It’s critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and was more interested in the … [Read more...]

Hardening Windows Endpoints Against Cyber Attack: Part II

In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack. Step 0: Pre-Engagement Step 1: Passive Recon Step 2: Active Recon Now the run really begins. In this blog post, you’ll learn how to put all the knowledge you gained during the planning and reconnaissance steps into action. Let’s walk through the next steps: Step 3: … [Read more...]

Hardening Windows Endpoints Against Cyber Attack: Part I

To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access to sensitive information. As part of the ethical hacking community, my ultimate goal is to help you secure your organization. … [Read more...]

Cyber Security Trends and Predictions for 2021, and Reflections on 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued assets people owned second to bitcoin.) The year was likely a gap year for most kids and university students.  The … [Read more...]