Have you ever wondered how to describe a gazillion of objects in the operating system in order to set up permissions to them… or how to change these permissions in different types of objects… and what tools do you need to do it? Well, sit back and relax — because you’re about to get THE answers.Read more
We’re really excited to start a new video series — Cybersecurity Talk — where we’ll be interviewing some of the best experts in our industry. Our first guest is amazing Sami Laiho.Read more
Today’s video tutorial has been prepared by Greg Tworek — he’ll deconstruct the Code Signing for you.Read more
Jeff and Paula shared the stage at the latest NIC conference in Oslo — this is where this interview was shot. They were talking PowerShell Security — one of Jeff’s favorite subjects (to the point where he sometimes dreams in PowerShell, as he admitted….)Read more
In this episode of CQURE Hacks Weekly, we’ll discuss Port Mirroring on Hyper-V. It’s a very interesting subject because Port Mirroring can be used in a good way… or to cause some serious trouble…Read more
Today we’re bringing on board Gary Hayslip — a CISO for the City of San Diego.
Gary advises the City’s executive leadership — mayoral, city council, and 30+ city departments and agencies — on protecting city government information resources. (They average about a half million attacks per day… it definitely keeps them busy.)Read more
Hands up if there’s someone here who has NEVER EVER stored a password in a browser… Honestly, I don’t think such human exists — we all did it at some point. So, how safe is it, really?Read more