We were using SolarWinds’ NCM (Network Configuration Management) tool at the time for configuration backups and auditing. We followed Fireeye’s mitigation recommendations from their blog post and took our server offline, evaluated hashes and other indicators of compromise, and determined that we were not compromised.
Read MoreI received some emails related to new authentication requirements when working on my Github projects after the holidays.
Read MorePassword policies are common in enterprise environments. Windows Active Directory has a basic one enabled by default after all. Unfortunately a lot of organizations either leave the default policy in place or make minor changes and never think about it again.
Read MoreI started a tradition when I blogged last year about security predictions. Hopefully my third kick at the prediction can yields better results! Obviously last year’s list missed a global pandemic, subsequent lockdown, and a major shift in how people work.
Read MoreThis blog is a fun list of gift ideas for the hacker or tech savant in your life. Nobody needs help with obvious gifts so this is more of a collection of less mainstream gadgets and toys.
Read MoreOne need look no farther than the headlines to hear horror stories of companies grinding to a halt because of ransomware or sensitive personal information being sold to the highest bidder. Securing your network is not only a necessity, it should be your number one priority.
Read More