While SMBv1 has been disabled on current operating systems, some older operating systems are still in production. This can cause the vulnerability to still existing in an environment. Sometimes is shows up unexpectedly. This was the case recently and how it was resolved through a GPO.
While deploying Active Directory with integrated DNS makes managing a domain easier, it does come with security risks. Separating out DNS can actually improve security and make things harder for a threat actor.
As organizations move from an on premises Exchange environment SaaS based M365. There are configurations that may allow email to slip in passed typical email filtering systems. This is all based on the configuration and described in this article, along with the solution.
Microsoft has ended support for Windows Server 2012R2. This means not only an end to features and bug fixes, but an end to security patches as well. Rather than building a new server from scratch, there is the option for an in-place upgrade.
What is a Vulnerability ?
In the context of cybersecurity, a vulnerability is a weakness or flaw in a system’s security posture that could potentially be exploited by attackers to gain unauthorized access, steal data, or cause damage. How to rate them, & prioritize remediation ?
There has been a rash of bogus warnings on Facebook, particularly targeting business users. Here is how to recognize what is and isn't a legitimate warning and how to protect yourself.
In today's digital age, where online transactions and interactions have become the norm, encountering errors while browsing the internet is not uncommon. One such error is the "419 Page Expired" message, which can be frustrating and confusing for users.
In May 2023, I attended the "European Identity and Cloud Conference 2023" as part of the Experts Exchange Reconnect program.
In this summary, I will give you the list of trend subjects of this conference
In today's world, data is more critical than ever. The amount of data generated grows exponentially, and new data sources are constantly emerging. This has led to the rise of the data-driven economy, where businesses and organizations use data to gain a competitive advantage.
Explore the essentials of securing Large Language Models (LLMs) in our comprehensive guide. Uncover the challenges of AI cybersecurity, learn to identify vulnerabilities, prevent adversarial attacks, and implement robust data protection. Stay ahead of the curve in maintaining model confidentiality .
A security breach at file transfer tool MoveIt has exposed the data of thousands of users, including the UK telecom watchdog Ofcom and the Minnesota Department of Education.
Risk management is identifying and assessing risk, reducing it to an acceptable level, and implementing the proper mechanisms to maintain it at that level.
This short article will list all pitfalls that I see when it comes to using SmartCards for user authentication (“PIV”). I will be looking at both security as well as practical aspects when it comes to handling. My expertise comes from a windows environment, however most of it is applicable all OS’.
How do organizations trust their cloud service providers for providing secure computing environments. customers in regulated industries and in general have to comply to several statutory regulations, how do they comply with the cloud?i had written an article on my blog ,here are some excerpts on SOC