Tag: IT security
June 7, 2024 |
The Open Share Epidemic
Open Access or unrestricted file share access is an inevitable condition that exists in most if not all, enterprise environments. Many organizations create ‘Open Shares’ to allow end-users an easy way to access resources.
Download eBook:
Remote Access Security Best...
June 7, 2024 |
Integrate Identity and Access Management with HIPAA, NIST, GDPR and CCPA in Healthcare
The healthcare sector is a top target of cyber criminals eager to steal sensitive data and extort high ransoms. The key to thwarting costly attacks is to understand that identity is the new security perimeter. By implementing robust identity and access management (IAM), healthcare organizations...
December 20, 2023 |
Information Security Policy: Must-Have Elements and Tips
Organizations often create multiple IT policies for a variety of needs: disaster recovery, data classification, data privacy, risk assessment, risk management and so on. These documents are usually interconnected and provide a framework for the company to set values to guide...
August 4, 2023 |
The Importance of Security Risk Assessments and How to Conduct Them
IT risk assessments are vital for cybersecurity and information security risk management in every organization today. By identifying threats to your IT systems, data and other resources and understanding their potential business impacts, you can prioritize your mitigation efforts to avoid costly...
July 31, 2023 |
Lateral Movement: Attackers Techniques and Best Practices for Defending Your Organization
Introduction
Even if you have implemented a Zero Trust security paradigm for network and infrastructure security, you need to plan for the inevitable — at some point, an attacker will get into your network with the intent to deploy ransomware or cause other damage
A typical attack...
July 6, 2023 |
Detecting Advanced Process Tampering Tactics with Sysmon v13
Sysmon is a component of Microsoft’s Sysinternals Suite, a comprehensive set of tools for monitoring, managing and troubleshooting Windows operating systems. Version 13 of Sysmon introduced monitoring for two advanced malware tactics: process hollowing and herpaderping. This article...
February 17, 2023 |
A Guide to Active Directory Linked Attributes
The Active Directory linked attribute is a special type of Active Directory attribute that is used to describe relationships between objects. This post explains what linked attributes are and how they work.
Handpicked related content:
Active Directory Security Best Practices
What makes...
January 27, 2023 |
Covenant C2 Fills the Void Left by Empire PowerShell
Post-exploitation tools are used by threat actors to move laterally inside a network and escalate their privileges in order to steal data, unleash malware, create backdoors and more. Red teams and ethical hackers also use these tools; indeed, simulating the efforts of adversaries plays a key role...
December 20, 2022 |
Event Log Monitoring and Log Audit Software Basics
Event logs can help you spot and troubleshoot security events so you can protect your systems and data. However, log records can be hard to read, and logs so noisy that you often have to sift through pages of events to identify critical events and potential threats.
Read on to learn...
December 16, 2022 |
Covenant C2 Framework: The Complete Tutorial
Covenant is one of the latest and greatest command and control (C2) post-exploitation frameworks. This post will walk you through the process of configuring Covenant and using it to execute payloads on compromised hosts.
Note: This post demonstrates the capabilities of Covenant as of...