Encryption at rest
In order to be compliant to certain industry standards, our management is asking our company to encrypt data at rest. We have enabled bitlocker on our workstations. How would you go about encrypting...
View Articleconfigure nokia G-1425G-B (Fiber modem) in bridge mode with sophos XG
Hi all,They recently provided us with a fiber modem that is configured in router mode, as we have a Sophos xg firewall, I wanted to reconfigure the Nokia in bridge mode and manage PPPoE authentication...
View ArticleNow that Wazuh tells me ALL that's wrong, i gotta fix 'em! LOL
I am getting the below warnings. Older versions of .NET. Version 6 is installed on the server and I am pretty sure it is all that is being used.3 questions:How do I know if they are doing anythingare...
View ArticleUsing WebBlocker to Deny Access to YouTube Shorts
I work in IT for a K12 institution. We recently began using WatchGuard on our network and are using WebBlocker as our content filter. I am attempting to set up a deny exception that will block access...
View ArticleMicrosoft Defender for Cloud - Security Center - fully depreciated?
Simple question, you would have thought...Is the Azure Security Center, Secure Score being fully depreciated? As per guidance, we have transitioned away from the Qualys scanner in favor of "Defender...
View ArticleUpgrading Trend Micro Worry Free Business Advanced (On premise) to Services Std
Hi!I'm told by my rep that there is no way to renew my licence from :Trend Micro Worry Free Business Advanced (On premise)to Worry-Free Business Security Services Standard.Not the client part, the...
View ArticleAzure S2S to Palo over BGP
Hello,I have an azure site to site vpn, I have bgp enabled over the vpn tunnel. I am trying to connect and peer with my palo alto on prem. Essentially we will have the ipsec connectivity and be bgp...
View ArticleCredential Theft Is Mostly Due To Phishing
According to IBM X-Force’s latest Threat Intelligence Index (https://www.ibm.com/reports/threat-intelligence Opens a new window), 30% of all cyber incidents in 2023 involved abuse of valid credentials....
View ArticleAnnual Pen test cost
We are starting to do annual pen testing. Since I am new to the annual pen test requirement, I was wondering what this should cost annually. I know it depends on a lot of factors so I will give a...
View ArticleGame-Changer: Biometric-Stealing Malware
I have been working in cybersecurity for a long time, since 1987, over 35 years. And, surprisingly to many readers/observers, I often say I have not seen anything new in the hacker/malware space since...
View Article