New Coordinates
Cyber Security Blog
by
3y ago
 Folks, I hope this finds you all doing well. As some of you may now, over the years, I have shared numerous perspectives on foundational cyber security and on Active Directory security, both here (i.e. on this blog) and at my second blog. Unfortunately, given my immense responsibilities today, and the sheer paucity of time, I will no longer be able to share my perspectives on multiple blogs, so from now on, I will mostly be sharing my perspectives at the Paramount Defenses Blog. I recently penned two relevant posts, including What's common between the Colonial Pipeline Hack and the Sola ..read more
Visit website
Coming Soon - "Active Directory Security for Attackers and Defenders"
Cyber Security Blog
by
4y ago
Folks, From the U.S. Department of Defense to the Trillion $ Microsoft Corporation, and from the While House to the Fortune 100, today over 85% of organizations worldwide operate on Microsoft Active Directory. The cyber security of these foundational Active Directory deployments worldwide is thus paramount to cyber security worldwide, and yet, unfortunately, the Active Directory deployments of most organizations remain alarmingly vulnerable to compromise. To help thousands of organizations adequately bolster their existing Active Directory security defenses, and to help millions of cyber ..read more
Visit website
The ONE Question NO ONE knows the Answer to at RSA Conference 2020
Cyber Security Blog
by
4y ago
Hello, On Monday, the RSA Conference 2020 will begin, where almost a thousand cyber security companies will showcase their greatest cyber security solutions to thousands of attendees, and where supposedly "The World Talks Security!" If that's the case, let's talk security -  I'd like to ask the entire RSA Conference just 1 simple cyber security question - Question: Do the companies whose CISOs and cyber security personnel are attending the RSA Conference '20 have any idea exactly who has what privileged access in their foundational Active Directory deployments today? If they don't, the ..read more
Visit website
Who Needs WMDs (Weapons of Mass Destruction) Today ?
Cyber Security Blog
by
4y ago
Folks, Today, yet again, I would like to share with a simple Trillion $ question, one that I had originally asked more that 10 years ago, and recently asked again just about two years ago. Today it continues to be exponentially more relevant to the whole world. In fact, it is more relevant today than ever given the paramount role that cyber security plays in business and national security. So without further adieu, here it is - Who needs WMDs (Weapons of Mass Destruction) Today? Ans: Only those who don't know that we live in a digital world, one wherein virtually everything runs on (n ..read more
Visit website
What is Active Directory? (Cyber Security 101 for the Entire World)
Cyber Security Blog
by
4y ago
Folks, Today is January 06, 2020, and as promised, here I am getting back to sharing perspectives on cyber security. Cyber Security 101 Perhaps a good topic to kick off the year is by seeking to ask and answer a simple yet vital question - What is Active Directory? You see, while this question may seem simple to some (and it is,) its one of the most important questions to answer adequately, because in an adequate answer to this most simple question lies the key to organizational cyber security worldwide. The simple reason for this is that if you were to ask most CISOs or IT professionals ..read more
Visit website
Its Time to Help Defend Organizations Worldwide
Cyber Security Blog
by
4y ago
Folks, I trust this finds you all doing well. It has been a few months since I last blogged - pardon the absence. I had to focus my energies on helping the world get some perspective, getting 007G ready for launch, and dealing with a certain nuisance. Having successfully accomplished all three objectives, it is TIME to help defend organizations worldwide from the SPECTRE of potentially swift and colossal compromise, which is a cyber security risk that looms over 85% of organizations worldwide. When you know as much as I do, care as much as I do, and possess as much capability as I do, y ..read more
Visit website
Its Time to Save the World from the SPECTRE of Compromise
Cyber Security Blog
by
4y ago
Folks, I trust this finds you all doing well. It has been a few months since I last blogged - pardon the absence. I had to focus my energies on helping the world get some perspective, getting 007G ready for launch, and dealing with a certain nuisance. Having successfully accomplished all three objectives, it is now finally TIME to help save the world from the SPECTRE of potentially swift and colossal compromise, which is a cyber security risk that looms over 85% of organizations worldwide. When you know as much as I do, care as much as I do, and possess as much capability as I do, you n ..read more
Visit website

Follow Cyber Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR