Sponsored by Keepnet Labs

How to ...?

A CISOs role in Security Leadership – 6 Critical Tips ( Free PDF)

A CISOs role in Security Leadership A short summary of a CISO's role definition, and the six critical responsibilities  underpin Chief Information Security Officer's success, here free to download or browse at LinkedIn with out any download need . Download right from this blog : A CISO's Role in Security Leadership View via LinkedIn : Click Here (more…)


CISO

CISOs End to End Security Operations – ( Part 1)

CISOs End to End Security Operations The Chief Information Security Officer (CISO) ensures the end-to-end (E2E) security operations of an organization. Together with their security team, they handle all security operations, enforce policies, and evaluate and address system vulnerabilities to ensure that a company's information assets are safe from both internal and external threats. This chapter will cover a typical day of a CISO and their [...]


Posted By Category: Cyber Security, How to ...?Tags: Comments: 0
Phishing

How to protect yourself from phishing ? 6 Effective Tips

How to protect yourself from phishing ? A phishing attack is an attack vector that cybercriminals use it mainly for identity theft, which they manipulate users to hand over their personal and sensitive information. It is a sort of social engineering attack which is mainly initiated via email. For instance, in many cases, cybercriminals sent out warnings to users manipulating [...]


Windows 11 Shut Down shortcut

Windows 11 Shut Down shortcut – In 3 easy steps

Windows 11 Shut Down shortcut Did you ever wonder how you can shutdown your Windows 11 ( and 10) with a single click ? Its really easy , lets do it in 3 very easy steps 1.  Right Click any space in the desktop, Select New then shortcut as shown in the below screenshot Windows 11 Shut Down shortcut 2. Type the below command and [...]


Posted By Category: How to ...?Tags: Comments: 0
VMware error

VMware error ” Unable to open kernel device “\\.\VMCIDev\VMX ” – S1mple & Effective

VMware error " Unable to open kernel device "\\.\VMCIDev\VMX "   Are you getting the bellow error and don't know how to move ahead, below is an easy fix for your problem " Unable to open kernel device "\\.\VMCIDev\VMX" Module DevicePowerOn power on failed. " VMware error   Steps to fox 1> Open your default VM's location , in my case: C:\Users\erdalo\Documents\Virtual Machines\Windows 10x 2> Find and edit  [...]


6 Strategies that security leaders must take to safeguard data

Six Strategies that security leaders must take to safeguard data in storage and backup systems The what, why, and how of securing storage and backup The cost of a single data storage breach could overwhelmingly exceed the investment in a storage security framework and controls (we will cover financials in more detail in the next article in the series). Data-centered attacks are [...]


Posted By Category: General, How to ...?Comments: 0
Incident response with Microsoft Azure

Incident response with Microsoft Azure – Superior Guide to 1R

Incident response in the cloud As we've already learned, an incident is a service disruption that impacts your customers and end users, regardless of where this is—be it a mobile device or the cloud! We've also learned that incidents can come in many different forms, ranging from performance slowdowns to system crashes or difficulties reaching your server or service! When we look [...]


Posted By Category: Cloud Computing, Cyber Security, How to ...?Comments: 0
What is Social Engineering

What is Social Engineering ? ( free guide to SE 101 )

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick their victims [...]


Kaseya VSA Breach

Kaseya VSA Breach Consequences of Security Failures

Kaseya VSA Breach Consequences of Security Failures The world has witnessed another large-scale cyber-attack. On July 2, 2021, Kaseya, an IT Systems Management software firm, disclosed a security incident impacting their on-premises version of Kaseya’s Virtual System Administrator (VSA) software. The result was up to 1500 companies being held hostage to a significant ransom demand. Incidents such as these are becoming more commonplace. We are [...]


Kernel API Virtualization by Comodo Erdal

Kernel API Virtualization by Comodo – Uncovered (1)

Kernel API Virtualization by Comodo When it comes to securing your enterprise endpoints, it’s important to have a foundational understanding that there are three types of files: the good, the bad and the unknown. Approaches such as Antivirus (both vendor-branded “next gen” and legacy detection-based), Blacklisting and Whitelisting handle the known good and the bad files – but what about [...]