Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

The Policy Expert: Lan Manager Authentication Level

LAN Manager (LM) is a family of early Microsoft client/server software that allows users to link personal computers together on a single network. Network capabilities include transparent file and print sharing, user security features, and network administration tools. In Active Directory if the Kerberos protocol is not negotiated for some reason, Active Directory will use LM, NTLM, or NTLMv2.

The Policy Expert: Do Not Allow Supported Plug and Play Device Redirection

This policy setting allows you to control the redirection of supported Plug and Play devices, such as Windows Portable Devices, to the remote computer in a Remote Desktop Services session. By default, Remote Desktop Services allows redirection of supported Plug and Play devices.

The Policy Expert: MMS: IP Source Routing Protection Level

IP source routing is a mechanism that allows the sender to determine the IP route that a datagram should take through the network. An attacker could use source routed packets to obscure their identity and location. Source routing allows a computer that sends a packet to specify the route that the packet takes.

The Policy Expert: Maximum Security Log Size

Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source. Allocating insufficient storage space will lead to information loss of what happened in the network, therefore breaches could remain undetected.

The Chicken & Egg Secret Protection Problem in Micro-services

Alice keeps all her passwords in an Excel file on her desktop. However, she was told it is a very bad practice, since Eve can easily get access to the computer, read the file,and access Alice passwords and accounts. To enhance her security, Alice got a password protection software, KeePass, and she now saves all her passwords safely there – except for her KeePass password, which Alice keeps in an Excel file on her desktop. ‍Good news for Eve...

It's All About the Baselines: Security Edition

I am all about the baselines. I’ve made an entire career out of them. But if you were to ask a random person on the street what that means, the reaction would be: “Who the heck are you, and why are you asking me random weird questions.” So it would be better if you found someone in the tech industry at least.

Rezilion Launches Autonomous Solution for Securing Cloud Production Environments

Tel Aviv, Israel, December 10th, 2019 Rezilion, the autonomous cloud workload protection platform, today announced its emergence from stealth and $8 million in seed funding led by Jerusalem Venture Partners (JVP). JVP was joined by Kindred Capital, LocalGlobe and Samsung NEXT. The investment will be used to expand their R&D team in Israel, as well as build sales operations and support in the US.

On Humility and DevSecOps

Rezilion is a company founded in humility. By that, We don’t mean that we’re not incredibly proud of what we’re doing, but rather that the ideology of the company comes from some humbling lessons from the past. When we founded our previous company, we thought we had next-gen security all figured out. We built an incredibly powerful heuristic solution that had a false positive rate of 1 in 500,000,000.

AppsFlyer Case Study

AppsFlyer is a mobile attribution and marketing analytics company that helps marketers, ad agencies and app creators measure and optimize their marketing campaigns. The data, tools & insights from AppsFlyer enable advertisers to make better business decisions, protect their ad spend from fraud, and fuel their own data-driven marketing innovations. The company is headquartered in San Francisco with 14 additional offices around the world.