Learn how to execute the fundamentals, harden your defenses, and protect your business’s network security with no high-tech software. Read more »
Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them. Read more »
Using a fax server is a headache most companies can avoid. Modern solutions are cheaper, faster, and better for everyone at the office. Read more »
MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a custom-built C# LDAP parser designed for tokenization and syntax... Read more »
Users of Google Cloud’s virtual machines can now get in-house attestation for VMs that offer AMD encrypted virtualization. Read more »
Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM),... Read more »
Version 24H2 adds the sudo command and alerts users when an application accesses their physical location. Microsoft polished other security features, too. Read more »
Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific... Read more »
SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active Directory environments, as... Read more »
Setting up a conference bridge isn’t hard, but you don’t want to get it wrong for important calls. Learn how to bridge calls securely. Read more »