Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
There is no better feeling than finally giving session on a real stage, instead of virtually! We all have trully missed face-to-face interacting with people. Our CEO, Paula Januszkiewicz have had this opportunity during this year's edition of GISEC Global Conference 2021 - Thank you!
Privacy and security are always top of mind for IT, but never more so than at this moment when the reality continues to impact how organizations operate today. Remote workforce is becoming a common practice.