PinnedRethinking Trust: Advanced Security Measures for High-Stakes SystemsA digital signature is an excellent preventive measure, but when it comes to exploiting or infiltrating high-value targets things change….Nov 4Nov 4
PinnedEKUs in WDAC, App Control for Business, PoliciesEKU stands for Extended Key Usage, which is an extension of X.509 certificates that delineates the functions of the public key of the…Jan 27Jan 27
PinnedThe proper security mindset and rationale for Personal and Business usersProper and proven ways to defend, secure and harden your environment for personal, business, enterprise or military use cases.Aug 14, 2023Aug 14, 2023
PinnedWDAC policy for BYOVD Kernel mode only protectionThis scenario involves removing the trust to any Kernel mode driver, whether they are vulnerable or not. It does not affect User-mode…Jul 23, 2023Jul 23, 2023
How to Securely Connect to Azure VMs and Use RDPTo establish a secure connection to your Azure VM, you need to make some preparations. You can avoid exposing your VM’s RDP portSep 24, 2023Sep 24, 2023
BitLocker, TPM and Pluton | What Are They and How Do They WorkBitLocker, TPM and Pluton | What Are They and How Do They WorkAug 31, 2023Aug 31, 2023
Published inDetect FYIClean Source principle, Azure and Privileged Access WorkstationsWe have explored the clean source principle, which states that all security dependencies must be as trustworthy as the object being securedAug 24, 2023Aug 24, 2023
How to create Bootable Windows USB flash drive with no 3rd party toolsHow to create Bootable USB flash drive with no 3rd party tools for Windows clean installation.Aug 14, 2023Aug 14, 2023
Privacy, Anonymity and CompartmentalizationPrivacy, Anonymity and Compartmentalization, First, we discuss privacy, which is the right to control what information is collectedJul 23, 2023Jul 23, 2023
Windows Defender Application Control (WDAC) IntroductionApplication control is a crucial line of defense for protecting enterprises given today’s threat landscape.Jul 23, 2023Jul 23, 2023