Feed on
Posts
Comments

Category Archive for 'Security Architecture'

Tier 0 and GDPR

I love working with security and I´m fully aware that there is always an expert that knows the details better than I do and also another expert that knows the whole field better than I do. I can only prod along and do my best. Sometimes, however, I´m baffled by how some people are blind […]

Read Full Post »

Yet a year has passed

Wohoo! The day has come when I turn 45 and I have still many years left to work in the most interesting of fields. There is so many new vulnerabilities still waiting to be found. I expect the next year to have focus on lower level attacks and also more stealthy attacks. On the level […]

Read Full Post »

Why do I care about defining Tier 0 and why is it a problem to have a large Tier 0? It is all part of minimizing the attack surface. You want to minimize the places where it is possible to find a domain administrator account and exploit that. It is far easier to secure 20 […]

Read Full Post »

Defining Tier 0

Credential Theft is a bid problem today. Many of the attacks we see are targeting accounts rather than the individual computers. This is due to the cost of exploiting. As soon as you have a valid account it is much easier to travel around and try to find a domain admin account. As soon as […]

Read Full Post »

WPA2 breached

May you live in interesting times! Using WPA2 apparently is not a good idea anymore. This caught my interest as it is a breach on a protocol level rather than just a function and there are many companies that have moved to WIFI and rely of WPA2-Enterprise to secure the communication. So many WIFI units […]

Read Full Post »

Here in Sweden GDPR is one of the hottest topics within security. There is a lot of confusion regarding what is needed to be done and what different parties need to do. First of all, GDPR is a law. Any lawyers out there would probably want to correct me as it´s an EU thing, but […]

Read Full Post »

Azure Recovery Vault

Yet a former client of mine has been hit by a ransomware. They used an online backup system that used mapped drive so they was partly encrypted as well. Still they were immensely lucky to having tried Azure Recovery Vault. Before joining Microsoft I had very little knowledge of the inner workings of Azure. Currently […]

Read Full Post »

Credential Guard

One of the best things with working at Microsoft is all the things you get to know and one of the worst things is all the things you are not allowed to tell (yet). Still I took a look at Credential Guard today to understand how it works and I found this document that describes […]

Read Full Post »

An architect asked me yesterday how you use a reference architecture when it comes to security architecture. ‘How can I be sure that it is applicable for me?’ was the simple and yet interesting question. The answer is not that obvious. First of all, we need to position your own security to the reference architecture. […]

Read Full Post »

Lateral movement

If you are a pentester you a perfectly aware of lateral movement but if you are a bit more far away from technology you probably won’t read any more right now but I would advice you to continue reading. What is lateral movement? It’s the process of getting access to a computer, capture the credentials […]

Read Full Post »

« Prev - Next »