How To Detect AS-REP Roasting With Blumira
During a recent proof of concept with a new customer, there was an interesting back and forth between our Blumira team and the customer testing our detections in a pentesting lab e...
Read MoreWhat To Log In A SIEM: Logging Best Practices
A poorly configured SIEM can result in an overwhelming amount of useless alerts — or worse, a lack of alerts for real security incidents. Neither option is ideal. Many new B...
Read MoreBest Practices For Configuring Firewall Rules
A firewall won’t secure your environment like it should if you don’t properly configure its ports and policies. But which ports should you block? It’s a question that every s...
Read MoreHow to Install & Configure Microsoft LAPS
LAPS (Local Administrator Password Solution) is a free and helpful tool that Microsoft recommends for local administrator password management. Below you will find a step-by-st...
Read MoreA Guide To Cybersecurity Deception Techniques
Using “low-hanging fruit” cybersecurity deception techniques to entice an attacker that has already infiltrated an environment will offer even more opportunities for early dete...
Read MoreDetecting Breaches in the Cloud
Over time, more and more assets and environments are being moved to different areas of the cloud. Whether it is a major service like Azure, AWS, or GCP or smaller companies who may...
Read More