Feed on
Posts
Comments

Category Archive for 'Security Architecture'

WPA2 breached

My you live in interesting times! Using WPA2 apparently is not a good idea anymore. This caught my interest as it is a breach on a protocol level rather than just a function and there are many companies that have moved to WIFI and rely of WPA2-Enterprise to secure the communication. So many WIFI units […]

Read Full Post »

Here in Sweden GDPR is one of the hottest topics within security. There is a lot of confusion regarding what is needed to be done and what different parties need to do. First of all, GDPR is a law. Any lawyers out there would probably want to correct me as it´s an EU thing, but […]

Read Full Post »

Azure Recovery Vault

Yet a former client of mine has been hit by a ransomware. They used an online backup system that used mapped drive so they was partly encrypted as well. Still they were immensely lucky to having tried Azure Recovery Vault. Before joining Microsoft I had very little knowledge of the inner workings of Azure. Currently […]

Read Full Post »

Credential Guard

One of the best things with working at Microsoft is all the things you get to know and one of the worst things is all the things you are not allowed to tell (yet). Still I took a look at Credential Guard today to understand how it works and I found this document that describes […]

Read Full Post »

An architect asked me yesterday how you use a reference architecture when it comes to security architecture. ‘How can I be sure that it is applicable for me?’ was the simple and yet interesting question. The answer is not that obvious. First of all, we need to position your own security to the reference architecture. […]

Read Full Post »

Lateral movement

If you are a pentester you a perfectly aware of lateral movement but if you are a bit more far away from technology you probably won’t read any more right now but I would advice you to continue reading. What is lateral movement? It’s the process of getting access to a computer, capture the credentials […]

Read Full Post »

PAW in depth

As you read in my previous message I´m joining Microsoft. One thing you have to do at MS is to return to the school bench as there is so much to learn. As for now I´m only allowed access to external material so let me share with you a few views on the PAW PAW […]

Read Full Post »

Destruction to follow

Following my last post a few clients started asking me about the future of ransomware. I brought up this picture showing a number of predictions I have done during the years and when they were found in the wild. One prediction is that more failures will happened, either intentionally or unintentionally, and that will start […]

Read Full Post »

WannaCry aftermatch

Ransomware makes you wanna cry and the name of the latest outbreak is fitting. You have most probably read 100ths of post regarding how to protect yourself moving forward and I will not repeat those tips and tricks but instead focus on some real-life experiences that actually prevented the ransomware in the first place: 1. […]

Read Full Post »

Following on the administrator is the DBA, a person that is almost mythical as it´s a very scarce resource. During my years as a DBA I always had full access to everything within the database and as many databases was run under domain admin accounts I could do anything in the environment that I wanted. […]

Read Full Post »

Next »