Introduction
From a security perspective, disabling the ability to generate a Kerberos Ticket using RC4 encryption is crucial for preventing attackers from easily obtaining password hashes. This blog post explores the steps and
Summary
Microsoft Sentinel is a great tool to collect logs, but it has a flaws. Once of those flaws is Microsoft has changed the agent it recommends and does a poor job of
Executive Summary
This is part 3 of my weekend series on IT cyber security program basics. In my last blog post, we discussed establishing and information security program (ISM), patch management, change control
Executive Summary
This is part 2 of my weekend series (technically it is Tuesday, but I took some vacation time over the weekend and my goal was not to be technology free, which
Executive Summary
During my career as a consultant and at my current employer working in Information Technology (IT), the focus on being more secure has been placed on finding the latest widget or