logo

Privileged Access Management in Windows Server

Many organizations struggle to secure their systems because their Active Directory is already compromised. AD is usually compromised by insiders or successful attacks on them. So how to keep environment protected even when a privileged your account got hacked? Microsoft Windows Server 2016 has many great features to help. Download free guide: Microsoft Windows Server … Continued

Expert Advice: Is CISSP Worth It?

CISSP, which stands for Certified Information Systems Security Professional, is the gold standard for security certifications and an internationally acknowledged benchmark for infosecurity professionals. As you might expect, therefore, becoming a CISSP requires a great deal of time and effort, from studying the Common Body of Knowledge and completing other training to gaining sufficient professional … Continued

Auditing Windows Systems

Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing include: Event Logs and Event Log Forwarding Auditing and Advanced Auditing Audit … Continued

How to Make Your Security Monitoring and Data Discovery Processes GDPR-Compliant

Thanks to the GDPR, the attention of organizations everywhere seems to be focused on the personally identifiable information (PII) that they collect, process and store. Since the GDPR requires protecting the PII of all EU residents, organizations have to be concerned about not just customers, clients and prospects, but their own employees and contractors as … Continued

Hyper-V Security in Windows Server 2016

Administrator accounts work differently in virtualized environments than they do in physical ones. In particular, in a physical environment, administrative roles, such as storage administrator, network administrator, backup operator, and virtualization-host administrator, have limited or isolated rights. In contrast, in a virtual infrastructure, each of these roles with permissions to manage the physical infrastructure might … Continued

[Infographics] Cloud Security Risks in the Financial Sector Explained

There is a lot of ongoing buzz in the media about the attractiveness of cloud technology for financial organizations — and the cybersecurity challenges that come with it. The benefits of cloud use include increased flexibility, agility and cost reduction; in fact, IDC Financial Insights calculates that the biggest global banks will save $15 billion … Continued

Protecting Credentials in Windows Server 2016

Windows Server 2016 includes multiple tools to reduce the risk of credential theft and misuse. The Protected Users group restricts insecure authentication methods, while account policies and managed service accounts strengthen user, computer, and service account security. Windows Defender Credential Guard isolates secrets with virtualization-based security, and Microsoft LAPS ensures unique, automatically rotated local admin … Continued

How to Calculate Return on Security Investment

Return on Security Investment (ROSI) quantifies how much loss an organization avoids through cybersecurity spending, making it possible to justify budgets and assess strategy effectiveness. Using quantitative risk analysis, ROSI factors in annualized loss expectancy, threat frequency, single incident cost, and mitigation ratio to estimate savings. Accurate risk assessments, compliance considerations, and organizational readiness all … Continued

How to Create an Effective Information Security Risk Management Framework

If you are responsible for corporate information security risk management, we both know your job is tough. Businesses keep generating large volumes of data, IT systems are increasingly complex, and cyber threats continue to evolve. What you have to deal with may sometimes look like an endless number of challenges, and your budget and resources … Continued