Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

If someone asked you: "what is the single dumbest thing Microsoft has ever done?", what would you answer? Since I am mainly an IT security guy, here is my answer from a security perspective.
2
Acronis True Image 2019 just released!
LVL 1
Acronis True Image 2019 just released!

Create a reliable backup. Make sure you always have dependable copies of your data so you can restore your entire system or individual files.

Due to recent circumstances, my siblings and I started speaking about ways to keep safer. The steps we came up with are delineated here. I hope this helps others prepare themselves for a world we should never have had to prepare for.
2
Are your internet connected devices as secure as they should be?
2
SecPIVOT
Take a step back to reflect where are we now and where we should be heading to in the next (and many more) tranches of getting to implement the RIGHT security. We need to build security PIVOT to stay in the cyber chase with the adversaries.
2
PDF Password Unlocker
Did you forget the password for protected PDF documents? If yes, then go through this blog and get the best idea to remove security from Adobe files.
0
The threat modeling process is iterative; it takes inputs and generates outputs for each step in the process; it outlines the possible attacks that could be made on your application/system; including how severe a threat is and how much damage it could do.
5

Expert Comment

by:Nirmala Y, CISSP, CCSP
Comment Utility
Thanks for keeping process, methodology in one place and well explained.
2

Expert Comment

by:Albert Gavrielov
Comment Utility
Very detailed and useful articale
2
While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.
1
Secure Software Development Life Cycle (S-SDLC) means security across all the phases of SDLC. A high profile security breaches underline the need for better security practices.
7

Expert Comment

by:Ammar Haj Hamed
Comment Utility
Good one.
1

Expert Comment

by:Ahmed Ali Khan
Comment Utility
Excellent Article, Covers complete lifecycle of S-SDLC, examples cited are real life scenarios which shows your prowess on cyberspace!!!
1
libSSH Authentication Bypass Vulnerability Analysis(CVE-2018-10933)
0
Win10 Windows Information Protection - Part 2
This is Part II of the WIP series. In Part 1 we checked basic requirements for WIP implementation and configured WIP for data encryption without device enrollment. In this part, we will look at application installation/execution control and device management in addition to data encryption.
1
Active Protection takes the fight to cryptojacking
LVL 1
Active Protection takes the fight to cryptojacking

While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.

Win10 Windows Information Protection - Part 1
With Windows 10, Microsoft has come up with built-in support for Intune data protection policies. This is a two-part series. In this 1st part, we look at how and to what extent we can safeguard corporate data on Windows 10 workgroup machines (BYOD) with Windows Information Protection and Applocker
1
LVL 47

Author Comment

by:Mahesh
Comment Utility
Hi Andrew,

Many Thanks for putting your time, hard work & efforts in reviewing and publishing this article.

I will be more than happy if I get any option on this site to appreciate your honest efforts

Mahesh.
0
Name Mismatch Errors
Have you ever received a “This page is not protected” error while trying to access a web page? Maybe even your own web page? This may mean that the site, or your site, that you are trying to access has an SSL Certificate Name Mismatch error.
2
This article describes the Email relay concepts and the possible road blocks and solutions to certain email security scenarios.
1
Artificial Intelligence
We’d all like to think our company’s data is well protected, but when you ask IT professionals they admit the data probably is not as safe as it could be.
1
LVL 25

Expert Comment

by:Andrew Leniart
Comment Utility
Great article that explains the importance of not just relying on definitions based security solutions. Thanks for writing this. Interesting read!

Endorsed.
2

Expert Comment

by:Channing Oliver
Comment Utility
Great article, I have long thought about how an AI solution in this area could help reduce the time spent dealing with threats. At the speed AI is progress I think AI security is much closer than ever.
0
PDF Unlocker for Mac
Want to remove a security password from PDF files? Know simple tips and tricks to remove security and restrictions from PDF files on a Mac OS X. Follow each step carefully to unprotect an Adobe PDF document.
0
Data loss can hit a business in any number of ways, from employees accidentally deleting information and hardware failure to natural disasters and cyberattacks wiping out your systems.
1
Enroll in these four OWASP courses: Avoiding Hacker Tricks, Forgery and Phishing, Proactive Controls, and Threats Fundamentals. Also learn a basic introduction to web design where you can implement these OWASP security measures.
2
Blockwell.ai KYC Casper Token "Psoriasis Advertising" Event Analysis
0
In April 2018, the "SamSam" ransomware attack crippled the city of Atlanta. The recovery that followed provides a stark reminder of the real costs associated with ransomware – both technologically and financially.
0
The 7 Worst Nightmares of a Sysadmin
LVL 1
The 7 Worst Nightmares of a Sysadmin

Fear not! To defend your business’ IT systems we’re going to shine a light on the seven most sinister terrors that haunt sysadmins. That way you can be sure there’s nothing in your stack waiting to go bump in the night.

This article documents the process of assigning different password policies based on user account password strength. The result of this script is that all the users that are using weak passwords are forced to have a password policy on them that allows their passwords to be valid for fewer days.
6
LVL 11

Expert Comment

by:Senior IT System Engineer
Comment Utility
Hi Shaun,

Can the DSInternals module be installed in another computer without RSAT installed?
Because I wanted to run the scheduled task for this report to send out email alert, not from the Domain Controller.
0
LVL 51

Author Comment

by:Shaun Vermaak
Comment Utility
Yes, it can :)

Just remember that you do not need DA. Configure an account with replicate directory access an use that in your scheduled task
0
ITSec vs CSec
I am sure that most of you will have chanced upon either of the terms like "Information (IT) Security" and "Cybersecurity" but do you know the differences and the implications as those threats evolve? Find out more in this article on the different security approaches that should be adopted.
2
Data integrity is the paramount concern when determining any form of a disaster recovery related solution. If a solution cannot preserve and guarantee the integrity of data placed in its trust, then the solution is of no value to an organization.
6
Newly released Acronis True Image 2019 includes their battle-tested anti-ransomware defense
1
LVL 18

Expert Comment

by:William Fulks
Comment Utility
Bagaudin - thanks for replying! This was with the 2015 version I purchased for work a while back. With previous versions we used to maintain a bank of system images and all that - for tech support - and with this new one because of the licensing it was limiting us to one machine. I also upgraded from a HD to an SSD and the process of making the image and restoring kept throwing errors even though both drives were fine. I eventually just quit using it and haven't in a couple of years.
0
LVL 2

Expert Comment

by:Bagaudin Satuev
Comment Utility
Thanks for the detailed feedback, William!

I dearly hope that if (when) you consider our products again - you'll let me or any other Acronis vendor expert know.
0
The Scavenging Attacks of Ethereum's stolen currency in"Post-Smuggling Era".
0
'Ethereum Smart Contract Specification Issue' Impact Analysis
0

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.