Random Thoughts of an IT Security Professional
  • Home
  • About
  • Hire Me for Consulting Work
  • Resume
  • Blog Recommenations

Strengthening Security: Disabling RC4 for Kerberos Ticket Generation

2 years ago 4 min read
Introduction From a security perspective, disabling the ability to generate a Kerberos Ticket using RC4 encryption is crucial for preventing attackers from easily obtaining password hashes. This blog post explores the steps and
Read Now Read Later
By: TBJ Consulting

Microsoft Sentinel Insecure Protocols with the AMA Agent

3 years ago 2 min read
Summary Microsoft Sentinel is a great tool to collect logs, but it has a flaws. Once of those flaws is Microsoft has changed the agent it recommends and does a poor job of
Read Now Read Later
By: TBJ Consulting

Information Technology Cyber Security Program Basics Part 3

3 years ago 4 min read
Executive Summary This is part 3 of my weekend series on IT cyber security program basics.  In my last blog post, we discussed establishing and information security program (ISM), patch management, change control
Read Now Read Later
By: TBJ Consulting

Information Technology Cyber Security Program Basics Part 2

3 years ago 7 min read
Executive Summary This is part 2 of my weekend series (technically it is Tuesday, but I took some vacation time over the weekend and my goal was not to be technology free, which
Read Now Read Later
By: TBJ Consulting

Information Technology Cyber Security Program Basics Part 1

3 years ago 9 min read
Executive Summary During my career as a consultant and at my current employer working in Information Technology (IT), the focus on being more secure has been placed on finding the  latest widget or
Read Now Read Later
By: TBJ Consulting
Newer Posts
Page 5 of 13
Older Posts
Powered by Ghost
Random Thoughts of an IT Security Professional