I’ve enjoyed a fascinating and deeply fulfilling career in cybersecurity that has taken me all over the world, and now I want to share my experience of working in what I consider to be the most fun and exciting industry out there. That’s why I held a live event to answer questions on what it’s really like to work on digital defense’s frontline. If you’re curious about how to advance in the industry or have a friend or relative who wants to work in cybersecurity, these insights from me and from the CQURE team are for you.
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Welcome to another episode of CQURE Hacks Weekly. This time we're going to discuss how to perform a memory dump. It is a very useful process, sometimes even a crucial one. Don’t forget about memory dump in case of any security incident when you need to collect the evidence and understand what happened.
When you look at the pyramids of Ancient Egypt, it’s clear that protecting your valuable resources by limiting access to them is not a new concept. In today’s world, where data is an organization’s greatest treasure, the Privileged Identity Management (PIM) service in Azure Active Directory makes it possible to manage, control, and monitor who accesses your most important digital resources.
Join Paula J as she demonstrates the many security-boosting possibilities offered by PIM in this beginners-level edition of CQ Hacks.
Did you know that some sign-ins are riskier than others? In this beginners-friendly episode of CQ Hacks, cybersecurity expert Paula J reveals the tell-tale signs of a compromised identity and how to configure Identity Protection in Azure Active Directory to cut login risk.