Hi, recently we have seen actual attempts at outside sources trying to use remote desktop to access our network and they had used one of our internal user accounts which they somehow managed to gain a…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringing your solution beyond military grade security.
Greetings to you. As a business that accepts credit cards we have to get scanned by Control Scan for our PCI DSS compliance.
We are currently failing compliance, but I am not sure how to resolve…
We have BYOD in our environment and around 10% Android devices. We use GOOD for secu…
In relation to this article here; http://www.telegraph.co.uk/technology/2016/11/16/cheap-android-phones-send-owners-text-messages-and-location-data/
Although the article says Blu devices are …
The SEP client version in use is 12.1.7004.6500.
We would like to use ADC function embedded to implement application whitelisting.
The fingerprints for all authorized program at one mach…
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
When scanning various banks online sites from https://www.ssllabs.com/ssltest/ ,
the result indicates they are still using TLSv1.0 (besides 1.1 & 1.2) :
As governance/compliance person, I'm often not being updated by network teams when
new VLANs / subnets are being created. Network diagram may not be updated timely too.
What are the surest ways…
Can anyone here please assist me in how to identify my existing SSL certificates which is using SHA-2 or not ?
I need to know if my existing SSL certificate is SHA-2 or not due to POODLE…
i am looking to get more skills and even to a Master in Cyber Security.
Which course you would recommend so i could also use it on my Masters in Cyber Security degree?
Refer to attached article.
Besides reading the product manual, is there any way I can verify if my
products has Blowfish enabled & if TwoFish is supported?
Some of encryption tools we use are C…
many files on shares are changed to .odin
can you help me out ?
What is the best way to restore or clean all machines ?
Could someone please describe Android security model by explaining how it is enforced by Linux kernel and at the application layer?
I am with an organization that is starting on the PCI project. We have 3 sites geographically separated that are connected via point to point connections. Only the main site stores the card …
We have hundreds of public facing web pages : do we protect all of them or only those
a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…
I am tasked to secure the site for one company and to prove that I did a good job.
I feel I need a small push to get started with ZAP.
Getting started with ZAP seems very obscure.…
Can anyone confirm that a user must have "take ownership" permission on a network share in order for ransomware to encrypt the files?
SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant.
Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like a customer’s personal and credit card information.
Part of my domain's WHOIS info shows the following:
Tech Name: Hostmaster, TABNet
Tech Street: 5 Financial Plaza
Tech City: Napa
Tech State/Province: CA
Tech Postal Code: 9…
We have a client who is interested in the most secure mobile phone for communication of email, voice and sms. Also, their employees use Gmail and other consumer apps on their phones and if a way these…
We have a BYOD estate that's fairly large, approx 3000 devices, mainly iOS.
We enforce a minimum iOS version of 8 via our MAM software. That is, of the user isn't running iOS 8 or above, the corpor…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Is there some sort of apps or tools or study that is being used out there for monitoring social networks? A week ago in one of our meeting that topic came up and we were left with the mouth open that …
Looking for some recommendations on Email Gateways. Hoping to catch the attention and get ideas from Exchange Admins, Cyber Security Professionals, folks who work the security field, email is a big o…