We recently talked about how we go about securing the execution of untrusted code on our endpoints by defining a Software Restriction Policy. Once we’ve got this base covered, from a security perspective, we now need to take the next steps towards securing our local systems. Local administrator accounts – the challenges Every Windows system… [ read more ]
Read More …Posts written by James Tusini:
Complying with NIST Password Guidelines in 2021
“In the beginning, passwords lived in simple times. It was the 60’s when we first saw them used to authenticate to computer systems and it was a time where physical presence was required. Nobody was remote, nobody was dialling in and there was certainly nobody connecting over the web. You walked into a room full… [ read more ]
Read More …Implementing Software Restriction Policy
This article is aims to be a comprehensive guide to creating a secure Software Restriction Policy and is quite a long read – we recommend you bookmark it now so you have it to hand when you need it. Securing your environment is a huge deal these days. Whereas we have all for a very… [ read more ]
Read More …Pwncheck 1.0.27 Announcement (HIBP V7)
We’re delighted to announce the latest release of pwncheck 1.0.27 – the fastest and safest way to find users with pwned passwords on your Active Directory network, offline and without sending your hashes to the cloud. The purpose of this release is to bring pwncheck inline with the latest version of Troy Hunt’s Have I… [ read more ]
Read More …Pwncheck Announcement 1.0.26
We’re delighted to announce the latest release of pwncheck 1.0.26 – the fastest and safest way to find users with pwned passwords on your Active Directory network, all offline. Some of the latest improvements include: • HiBP V6 support from Troy Hunt (~573M pwned passwords)• Massive speed improvements (now checking approximately 5k passwords/second).• You can… [ read more ]
Read More …April Security Challenge
The April Security Challenge is a call to mid-sized cybersecurity solution vendors that can help people suddenly faced with standing up remote working regain control of their environments.
Read More …Finding Pwned Passwords in Active Directory
There are plenty of different ways to hunt for pwned passwords in Active Directory. This complete guide walks through each approach, pros and cons and some quicker alternatives.
Read More …