Enterprise Security

These are Posts about Enterprise Security

Enhance Your Cybersecurity Skills with Practical Linux Projects

Introduction: Welcome to our latest blog post, dedicated to all aspiring cybersecurity enthusiasts! In the dynamic world of cyber security, practical skills are just as crucial as theoretical knowledge. This post is designed to guide you through a series of hands-on Linux projects that will not only elevate your understanding of cybersecurity systems but also […]

Enhance Your Cybersecurity Skills with Practical Linux Projects Read More »

Cyber Security Practice Test – All things PKI – Nov 2023

Welcome to this practice test on Public Key Infrastructure (PKI), a critical component of modern security architectures that underpins the trust and integrity of digital communications. Before diving into the questions, let us reflect on the story of Alice and Bob, two individuals who needed to communicate securely over an insecure medium: the Internet. Alice

Cyber Security Practice Test – All things PKI – Nov 2023 Read More »

The Three email security Amigos – SPF DKIM and DMARC

There are three critical protections when it comes to Email security. SPF, DKIM, and DMARC. Some people get tripped up on these three and what their role is. So here is an anecdotal tale of the three email security amigos. SPF (Sender Policy Framework): The Nightclub Bouncer Imagine you’re at a popular nightclub called “Email

The Three email security Amigos – SPF DKIM and DMARC Read More »

Harnessing AI in Cybersecurity – Annex Slides

These additional slides were created as part of one of our classes to complement the class slides I’ll cover the story below a little bit in class. The Rise and Rapid Fall of Microsoft’s Tay In the early months of 2016, the digital corridors of Twitter were abuzz with conversations spanning every conceivable topic. Sensing

Harnessing AI in Cybersecurity – Annex Slides Read More »

Vulnerability Categories and Risk Factors

The topic of software and network vulnerabilities is incredibly vast. Vulnerabilities can range from minor issues that pose little to no risk to the business, to significant risks that can bring an organization to its knees. Understanding the categories of vulnerabilities can help you prioritize them effectively. Here’s an in-depth look at various categories and

Vulnerability Categories and Risk Factors Read More »

Cybersecurity Exercise: Understanding and Applying the MITRE ATT&CK Framework

Objective: The aim of this exercise is to familiarize students with the MITRE ATT&CK framework by analyzing various cybersecurity scenarios. By dissecting real-world-like attack narratives, you’ll learn how to identify Tactics, Techniques, and Procedures (TTPs) commonly used by attackers, particularly Advanced Persistent Threats (APTs). Duration: This is a 30-minute exercise broken down into four scenarios,

Cybersecurity Exercise: Understanding and Applying the MITRE ATT&CK Framework Read More »

Unmasking Active Directory Threats: Defending the Heart of Enterprise IT

Active Directory serves as the pulsating core of modern enterprise IT systems. It offers organizations the prowess to efficiently manage an array of IT components, ranging from laptops, desktops, and servers to mobile devices, network equipment, printers, and beyond—essentially, any entity tethered to the network. With the agility it brings, specifying device and user permissions

Unmasking Active Directory Threats: Defending the Heart of Enterprise IT Read More »

HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts – Enterprise Information Security

Introduction Over the years, as information security teams, we have always been on the defense, forever waiting for the next security event before we can act. Although part of our strategy is to anticipate the adversary, we have not truly started to learn from the trends of the adversary to be prepared for the next

HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts – Enterprise Information Security Read More »

Scroll to Top