Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.
Articles & Videos
Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.
I have a friend who has outdated software on his web-server.
How can I prove to him that the server is vulnerable to attack?
My plan is to go to known vulnerability databases and …
I am tasked to secure the site for one company and to prove that I did a good job.
I feel I need a small push to get started with ZAP.
Getting started with ZAP seems very obscure.…
Any security risks comments on the abov…
I've never had to do this before, but need to set up a URL firewall in a windows 10 desktop. It needs to block all port 80 and 443 access except for an approved list. Based on all the link cr…
We were informed that the apps Rpcapd.exe in our Windows 10 should be disabled from msconfig. In msconfig services tab, it's description is "Remote Packet Capture Protocol v.0 (experimental)" from th…
Hi Experts, we have a client with a QNAP TS509, we have inherited this when we took the network over.
The issue is that it has been set up with intricate links between spreadsheets etc. Is their an e…
a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that the…
is anyone familiar with this tool: 'Kaspersky Anti-Ransomware Tool for Business'.
what is your opinion on it ?
is it free ?
I'm looking for more questions for users which should cover areas like:
a) Spam emails
c) Malwares & AV
d) Physical security
e) Data Confidentiality
f) Password & password complexit…
Friend got this....
real or fake?
Nick should I trust this E-MAIL and do what is says?
-------- Forwarded Message -------- Subject: MICROSOFT SECURITY - CRITICAL ALERT
Date: Tue, 20…
I am looking for some powershell scripts available that will report on Access security formatted for the general competencies such as PCI or IT general Control listing . In summary , some…
I am in the process of upgrading my SHA1 certificates to SHA-256. Before I do anything I want to check application compatibility with SHA-2. I could just create a new SHA-256 cert and test it out but …
Part of my domain's WHOIS info shows the following:
Tech Name: Hostmaster, TABNet
Tech Street: 5 Financial Plaza
Tech City: Napa
Tech State/Province: CA
Tech Postal Code: 9…
Whats Tor browser and will it cause any indues on my Mac ~ El Capitan?
Where can I get it and what should I know before using it?
I am being asked to look at a Windows SBS 2008 server which has been decommissioned for some time. I am being asked to see if anyone has accessed the server / files since it has been decommissioned.…
I had very strange problem,
After Suyces a Migration PKI to SHA2
and deploy new certificat in GPO and 802.1x
I had this problem authentication with workstation with Win7, after depl…
I plan to use tool to prevent following file extensions from being created but concerned
that it may impact legit software/apps. Anyone know if there's any adverse impact.
We have implemented thing…
Is RHEL or any specific OS that allows us to browse Internet and yet
highly not prone to ransomware & malware
Wanted to use it as 'jumphost' for browsing Internet
A Good linke: https://www.owasp.org/inde
I am in the process of upgrading SHA-1 certificates and some of the certificates do not show up in MMC. How can I find those certificates? Is there a way?
Recently I received a text from a person I recognized but who was not in my contacts. Despite the fact they were not in my contacts, their full name was in the body of the text along wi…
Our organization currently is on MS Exchange 2010 (with Outlook clients) without encryption.
We are contemplating to embark on encryption using Voltage.
a)Voltage allows users to choose to encry…
Introduction A frequent design pattern question for new PHP developers goes something like this, "How do I handle client registration and login?" It's done in every framework and CMS, and all …
Things That Drive Us Nuts Have you noticed the use of the reCaptcha feature at EE and other web sites? It wants you to read and retype something that looks like this.Insanity! It's not EE's fau…
13,121 points this week
David Johnson, CD, MVP
3,300 points this week
Jian An Lim
2,800 points this week
2,200 points this week
2,000 points this week