In practice, most of internet anonymous services are only exposing your net identity in a different manner, even more obvious and only in a noisier way! Long story short, if your are concerned about so-called ‘Privacy‘, do Not rely on popular techniques and tools of net anonymity! When you connect to a (Anonymous) VPN service… Continue reading How Net Anonymity Works?
Naturally Secure Windows Machine
How to utilize native Windows security features to get beyond all the tools in the market?! Most of the times ‘extra tools’ are just for doing things in a different way, perhaps more convenient, but not necessary in a better way, or more effective, cheaper or faster way and Windows is not an exception. Speaking… Continue reading Naturally Secure Windows Machine
Security Program: How To Thrive?
From struggling or hardly surviving, to a fully supervised and manageable security program… Most companies are struggling with running an smooth security program. No matter how much they are spending on that, the difference is really not that much. From zero budget to million dollars security budgets, they still do not have enough trust in… Continue reading Security Program: How To Thrive?
Complexity: The Hidden Monster behind Insecurity
No doubt that companies struggle with information security these days. Today they spend hundreds of thousand dollars, some millions, tomorrow they realize they have done nothing! Security folks do not have peaceful night sleep, because they know what they have done during the day could easy be compromised! Regardless of why we are spending money… Continue reading Complexity: The Hidden Monster behind Insecurity
Tips To Buy And Implement SIEM Solution
Use following checklist to make sure you are on the right track to choose your first or next SIEM solution. The whole process takes 1-4 weeks based on your dedication and vendor availability. Remember the worst thing is being in rush in five four steps: Write a plan Write down all the steps you anticipate… Continue reading Tips To Buy And Implement SIEM Solution
Commitment: The Sole Reason Behind Hackers Supremacy
Would you put more complex firewall rules when internal nodes are vulnerable due to initial default insecure setup, or setup numerous security tools while setting up more and more insecure nodes at the same time?!
Five signs IT is overwhelmed with operations
There are signs before your IT department faces a disaster or worse, jeopardize your business by affecting tech operations in different departments. Those are signs of an overwhelmed IT so let’s take a look at common signs and symptoms: 1) Lack of resourcesWhenever your IT staff are always talking about lack of resources be aware… Continue reading Five signs IT is overwhelmed with operations
Five Reasons to Start Your SIEM Initiative Today
Regardless of how SIEM in today’s cybersecurity marketing campaign is driven mainly by Compliance, which solutions is the best, and whether it should be managed or on-premises, Security Information and Event Management is conceptually accepted among security professionals so here’s my top reasons to consider SIEM implementation as one of your cybersecurity initiatives: Another tool… Continue reading Five Reasons to Start Your SIEM Initiative Today
Privacy: Does Cyberspace Leave Any For Us?!
What does ‘Privacy’ exactly mean to you, and is there anything left for us in cyberspace?
Vulnerability Management Elements
being able to dynamically connect and correlate data to different part of a vulnerability management interface is crucial.