Pen Testing Active Directory

You may have been following our series of posts on pen testing Active Directory environments and learned about the awesome powers of PowerView. No doubt you were wowed by our cliffhanger ending — spoiler alert — where we applied graph theory to find the derivative admin!

We know from the many emails we received that you demanded a better ‘long-form’ content experience. After all, who’d want to read about finding hackable vulnerabilities using Active Directory while being forced to click six-times to access the entire series?

Thanks to the miracle of PDF technology, we’ve compressed the entire series into an easy-to-ready, comfy ebook format. Best of all, you can scroll through the entire contents without having to touch messy hyperlinks.

Get The Ebook Now
Or check it all out online, here.
IT Pros

The Enemy Within: A Free Security Training Course by Troy Hunt

It takes a very long time to discover a threat on your network according to the Verizon DBIR: Which is mind-boggling given the most devastating breaches often start with an insider—either an employee or an attacker that gets inside using an insider’s credentials. Target, OPM, Panama Papers, Wikileaks. The list goes on and on. The truth is that many organizations are behind the curve when it comes to understanding and defending against insider threats. So…
Data Security, IT Pros

Five More Videos from RSA 2016

It’s been a few months since we last visited the RSA sessions from this year’s conferences. Much has happened since then: for starters,  more ransomware, Yahoo, increased GDPR awareness, news details on OPM, and state actors behaving badly. With that in mind, we reviewed the archived RSA 2016 videos and came up with five prescient sessions that help explains what’s going on now and into the future. In the Dark: An Introduction to the Hidden World of the…
IT Pros

How to setup your DNS Server like North Korea

I can only imagine it’s a high stress job doing IT support for Kim Jong Un as he’s the kind of manager who probably watches you over your shoulder, touches your screen a lot and drops dark hints about “disappearing” your family for three generations if the patches don’t get deployed properly. While we often hear lots about massive companies leaking data, state sponsored hacking and the latest about exotic encryption methods, most security issues…
Data Security

New York State Proposes Real-World Cybersecurity Regulations for Banks

The EU General Data Protection Regulation (GDPR) has raised the bar for what we expect from a national data security and privacy law. The US doesn’t really have anything close (outside of HIPAA for medical PII). So it’s interesting to see some movement at the state level. Let’s now give a shout out to New York regulators for their proposed cybersecurity rules for financial companies. Go Empire State! Like the GDPR, the New York  experiment…
Compliance & Regulation

If the GDPR Were in Effect, Yahoo Would Have to Write a Large Check

Meanwhile back in the EU, two data protection authorities have announced they’ll be looking into Yahoo’s breach-acopalypse. Calling the scale of the attack “staggering”, the UK’s Information Commissioner’s Office (ICO) has signaled they’ll be conducting an investigation.  By the way, the ICO rarely comments this way on an on-going security event. In Ireland, where Yahoo has its European HQ, the Data Protection Commissioner is asking questions as well. And here in the US, the FBI…
Data Security

Yahoo Breach: Pros react to massive breach impacting hundreds of millions o...

Yahoo has confirmed a data breach affecting at least 500 million users in the latest mega breach to make headlines. Here’s what some infosec pros had to say about it. If Yahoo waited ~2mo to inform Verizon of the breach, that says interesting things about the acquisition negotiations during that period. — Jeremiah Grossman (@jeremiahg) September 23, 2016 *** This will have an impact for years..yet another reminder to not reuse passwords on multiple sites! https://t.co/kAcI2N4zRN…
Data Security

[Podcast] Attraction of Repulsion (to Ransomware) – IOSS 23

When it comes to ransomware, we can’t stop talking about it. There’s a wonderful phrase for our syndrome, “the attraction of repulsion,” meaning that something is so awful you can’t stop watching and/or talking about it. How awful has ransomware been? According to the FBI, in the first three months of 2016, ransomware attacks cost their victims a total of $209 million. And it doesn’t stop there. It’s impacted many businesses including financial firms, government organizations, healthcare…
Customer Success

Genesis Financial Solutions Takes Proactive Approach to Protect their Data

Genesis Financial Solutions is a financial institution, lender and America’s largest source of second-look financing. They really understand how important it is to keep their data secure from insider threats and cyberattacks. They were seeking a solution that would give them insight into their sensitive data and improve the effectiveness of their regulatory compliance. With ransomware on the rise, Genesis also wanted a way to quickly alert the IT staff to any unusual file access…
Compliance & Regulation

Interview with Attorneys Bret Cohen and Sian Rudgard, Hogan Lovells’ ...

We are very thankful that Bret Cohen and Sian Rudgard took some time out of their busy schedules at the international law firm of Hogan Lovells to answer this humble blogger’s questions on the EU General Data Protection Regulation (GDPR). Thanks Bret and Sian! Bret writes regularly on GDPR for HL’s Chronicle of Data Protection blog, one of our favorite resources. Sian had worked at the ICO, the UK’s data protection authority, and helped draft the…
IT Pros

[Podcast] Statistician Kaiser Fung: Fishy Stats (Part 3)

Over the past few weeks, Kaiser Fung has given us some valuable pointers on understanding the big data stats we are assaulted with on a daily basis.  To sum up, learn the context behind the stats — sources and biases — and know that the algorithms that crunch numbers may not have the answer to your problems. In this third  segment of our podcast, Kaiser points out all the ways the stats can trick us through…
Data Security

Why the OPM Breach Report is a call-to-action for CSOs to embrace data-cent...

The Committee on Oversight and Government Reform released a fascinating 231-page report detailing the how and why behind the epic breach at the United States Office of Personnel Management. Richard Spires, the former CIO of the IRS and DHS, remarked on OPM’s failure to take a data-centric approach to information security: “[I]f I had walked in there [OPM] as the CIO—and, you know, again, I’m speculating a bit, but—and I saw the kinds of lack…