DEF CON 31’s Top Security Talks for Mid-Sized Enterprises
DEF CON is the world's largest annual hacker conference, and it's a great place to learn about the latest security threats and how to protect your organization. This year's con...
Read MoreAuthentication Protocols 101: NTLM, Kerberos, LDAP and RADIUS
Establishing the right authentication protocol for your business is one way to achieve better security, but the process can be overwhelming. We’ll walk you through some comm...
Read MoreHow To Detect SYSVOL Enumeration Exploits
SYSVOL is a target for attackers who want to gain unauthorized access to the domain. An attacker accessing a domain is catastrophic to any organization; admins would need to go thr...
Read MoreWhat Are Event Logs and Why Do They Matter?
Logs are everywhere -- which is good because they're a critical piece of operations work in computing, whether you work in DevOps, security operations, or IT operations. Analyzi...
Read MoreA Blue Teamer’s Bug Report
Recently I submitted my first ever bug report! For me, it's a big deal, since I usually think of bug reports as being something that only red teamers and pentesters are able to fin...
Read MoreBlumira’s SIEM Detection Rules Explained
A security information and event management (SIEM) platform detects and alerts on malicious behavior in an environment to protect from threats such as ransomware and breaches. S...
Read More