This blog post is to share with you some preventive measures that you can apply right now to prepare and build your security defense in the event of a similar attack at your Organization, these suggestions will be related to the recent attack on CISCO.
[Read More]Security Incident Response: Useful Tools (Part I)
I have gathered some handy tools that would definitely help when responding to Security Incidents, this is part I in a 5 part series.
[Read More]IT Security: System Hardening with CIS & NSA (Part I)
Every single node you bring to the network multiply the attack surface, routers, switches, NIDS, etc.… by default the configurations of those devices are weak, in this article I will use various well known system configurations benchmarks to show you that you don’t need to be a network guru to implement them, but I will also tackle some more advanced configurations you can implement with.
[Read More]Powershell: DSC Configuration (Part I)
Desired State Configuration (DSC) automates administrations and make it less an hassle, it decreases the complexity of scripting in windows and Linux systems and increase the speed of iteration, it is basically configuration as code (Infrastructure As Code). This feature is available beginning the release of powershell version 4.
[Read More]