Security
cancel
Showing results for 
Search instead for 
Did you mean: 

Forum Posts

Security as a ... Service?

With BlackHat going on this week, I can't help but think a little about security topics. We've talked a little about this topic in the past, but I keep going back to how hard it is for small companies to have dedicated security teams. Not when your I...

BScott by Community Manager
  • 17 Views
  • 0 replies
  • 0 kudos

Full Disk Encryption is a No-Brainer

Yesterday, I was assembling some notes on the benefits of having Full Disk Encryption (FDE) being available across all Linux distros. I awoke to a high severity CVE concerning OpenSSL, which is generally used to secure communications on the (OSI) tra...

JCDavid by Rising Star II
  • 105 Views
  • 0 replies
  • 0 kudos

Monitor JumpCloud with Datadog

Just saw this post from Datadog that allows you to monitor your JumpCloud environment using Datadog. I never got around to setting this up, only did SSO. Does anyone else use this?Monitor Your JumpCloud Directory With Datadog | Datadog (datadoghq.com...

BenGarrison_0-1652279987103.png

Cyber Insurance Audits

An old colleague just told me:"we actually got audited by our cyber security insurance provider and they enforced us to have MFA on literally everything. Down to the switches. It was huge pain in the a**."Have any of you ever faced challenges related...

JCDavid by Rising Star II
  • 83 Views
  • 0 replies
  • 0 kudos

Passwordless Authentication, what does it mean?

Industry buzzword, or really necessary? Passwordless authentication is something that comes up a lot in the world of Identity and Access Management.  We all have difference of opinion in "true" password less authentication. What does it mean to you? ...

It's Patch Tuesday! Uh...what does that mean?

Okay, I kid. I know what Patch Tuesday is. What I really wanted to do is talk a bit about what it means, though. Coming from a large enterprise, it has different meaning there than it does for small and medium enterprises. How frequently do you actua...

BScott by Community Manager
  • 417 Views
  • 4 replies
  • 2 kudos

Mac Security Compliance Project (mSCP) and More

Mac Security ComplianceMac admins can begin their compliance journey by following NIST's SP-800-219 secure configuration guidance and using some open source tools that automate deploying controls, using commands through MDM (mobile device management)...

JCDavid by Rising Star II
  • 266 Views
  • 0 replies
  • 1 kudos

Resolved! Hardening Windows

You don't have to attend Black Hat to know that there's a steady flow of vulnerabilities being discovered in Windows. It's the most popular desktop operating system and must support legacy setups to avoid breaking business systems. I've been working ...

JCDavid by Rising Star II
  • 546 Views
  • 2 replies
  • 1 kudos

Security in Cross-OS environments

Do you have difficulty having consistent security practices in a cross-OS environment? Is your security strategy different from user to user or from OS to OS? How much of this work is hands-on vs automated?

Certs, Love them or Hate Them?

IT administrators weren't expected to be security pros, until they were. I was in the same position where our network was too "live and let live" to be protected from emerging security threats. My journey began by asking questions and led to professi...

JCDavid by Rising Star II
  • 197 Views
  • 0 replies
  • 0 kudos