Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Understanding NTLMv1, NTLMv2 and NTLMv2 Session Security Settings

NTLM has three versions - NTLMv1, NTLMv2 and NTLMv2 Session Security. NTLMv2 is supposed to offer better security than its previous version, and to some extent it does provides better defense against relay and brute force attacks, but does not completely block them. NTLMv2 Session Security is a session security protocol that can be used in conjunction with NTLMv1 or NTLMv2 to provide additional security.

How employee training helps reduce cyber attack risk

In today's digital world, cybersecurity is no longer just a concern for IT professionals-it's essential for everyone in an organisation, from top executives to entry-level employees. The main reason for this is that humans are often the weakest link in security, but they can also become the strongest defence if properly trained. That's why businesses need to prioritise cybersecurity education for all staff members.

BlueVoyant: Enhancing Your TPRM Program: Strategies and Case Studies

Over the past 12 months, 95% of companies have been negatively impacted by a breach somewhere in their supply chain. The growing number of new critical software vulnerabilities and low rates of remediation in third party suppliers underscore the urgent need for robust third-party risk management (TPRM) programs. There are significant challenges to this, including insufficient personnel, accurate data collection, and keeping up with regulatory requirements.

BlueVoyant: Scary Cybersecurity Stories to Tell in the Dark

Cybersecurity measures in place by businesses, governments and individuals are increasingly being rendered obsolete by the growing sophistication of cybercriminals, according to the World Economic Forum. Join BlueVoyant and Microsoft on October 29 at 1p.m. ET to hear the terrifying real-life stories of cyber attacks: learn the unsettling truth of how the bad guys got in and how long they lurked undetected.

How the Digital Personal Data Protection Act transforms your business

India tops the world’s population with 1.4 billion people. Sixty percent of that population fall under the working age group, which is expected to increase over the next decade. The world’s eyes are on India, as the country sees a fair amount of digitization among all tiers of its cities.

The CUPS Vulnerability - The 443 Podcast - Episode 308

This week on, Corey Nachreiner and Marc Laliberte cover the "9.9/10 severity vulnerability affecting most Linux systems" that a researcher disclosed last week and what it means for Linux systems administrators. They also discuss a research post into Kia's remote control systems and then end with a new act that was just introduced into the US Senate to secure the healthcare industry.

Strengthening Email Security: DOJ Disrupts Russian Spear-Phishing Campaign

The need for an iron-clad email security solution is once again making headlines. On October 3,the US Department of Justice (DoJ) reported that, working with Trustwave partner Microsoft, it had disrupted a Russian government-based scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials.