This past month, I put together a new utility, SyslogTally, because I needed to easily and quickly answer a question pertaining to how frequently various scripts were being used in my environment. Original Need This question about script usage frequency first arose...
Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
Those who fail to learn the lessons of history are destined to repeat them. Don’t be that organization… Back in September of 2017, Avast indicated that the network of its recently acquired (July 2017) subsidiary had been infiltrated, and that its CCleaner...
A few weeks ago, I read an article that provided significant insight into the Spy vs Spy battles between the Unites States and Russia. Title: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil It was...
Ransomware is skyrocketing – but we really shouldn’t be surprised. In fact, many in the cybersecurity community saw it coming. To set the tone for what I’m talking about, here are just a few of the recent headlines pertaining to ransomware: ...
Lately, we have been hearing a steady refrain concerning cybersecurity: “It is impossible to guarantee security. Breaches are inevitable.” Is it really so because it is asserted with authority and confidence? Is it so because it is oft repeated? Inevitably, we are...