Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Windows 11 Boosts Security: NTLM Out, Kerberos In

Microsoft’s initiative to phase out NTLM authentication in favor of the more secure Kerberos protocol was originally announced back in October 2023. At that time, the Windows maker declared its intention to deprecate NTLM and encourage organizations to transition to Kerberos for authentication purposes across its ecosystem. Microsoft announced this week that later this year they are expecting to retire NTLM authentication in Windows 11.

User Account Control Settings Hardening Guide (2024)

User Account Control (UAC) serves as a security feature in Windows, aiming to safeguard the operating system from unauthorized modifications. Whenever alterations demand administrator-level permissions, UAC prompts the user, allowing them to either authorize or reject the requested change. User Account Control (UAC) provides several benefits, especially in maintaining security and minimizing risks associated with administrative privilege.

Learning from cloud transformation as we move to AI

Development teams of all sizes are embracing the excitement and possibility of using AI tools to build software. Coding assistants like Google Gemini and Github Copilot have the potential to accelerate development like never before, and developers are adopting these tools — whether or not leadership has officially approved them. As your team considers the best ways to adopt this new technology, this transition might feel like déjà vu.

How to Record SSH Sessions and Monitor User Activity in Linux with Ekran System [Hands-on Guide]

Monitoring user activity on your critical endpoints is a vital part of an effective cybersecurity strategy. Organizations need to monitor both remote and local user sessions to ensure user accountability, manage cybersecurity risks, enable prompt incident response, and comply with relevant cybersecurity laws and regulations. This is a step-by-step guide on how to monitor user activity in Linux and record remote SSH sessions on any endpoint with the Ekran System software agent installed.

Keeper Refreshes Browser Extension for Increased Usability

Keeper Security is excited to announce an updated User Interface (UI) for its browser extension across all supported browsers. The refreshed UI features a modernized design, and simplifies the process of finding and creating records for users. The new browser extension updates continue the recent UI enhancements to Keeper’s end-user vault and Admin Console.

Defining the Threat Created by the Convergence of IT and OT in Critical Infrastructure

Critical infrastructure facilities operated by the private and public sectors face a complex and continuously growing web of security threats that are compounded by the increasing convergence of information and operational technology (OT) in this area.

Understanding the NIS 2 Directive

By expanding its scope and introducing modernized requirements, the new NIS 2 Directive challenges organizations to elevate their cyber preparedness. This article explores how the directive affects a wide range of sectors and the critical infrastructure within them, detailing the requirements for compliance and highlighting the key role that IONIX plays in supporting organizations in meeting these regulations.