Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Getting Started With Teleport Desktop Access

In this video, we'll configure Teleport and Active Directory to provide secure, passwordless access to Windows desktops. In addition, you get Teleport's RBAC system to control access to these Windows desktops, support for copying and pasting to and from remote hosts, as well as Teleport auditing capabilities to capture logs and recordings of all desktop connections.

Myth Busting: Why Moving From VPN to ZTNA Doesn't Have to be a Heavy Lift

Over the last few years many organizations have already introduced a zero trust network access (ZTNA) solution, and are seeing the benefits from it. But many others have been put off by the work needed to transition to a zero trust-based access model and the associated technical integration work.

Predictions 2023: Data Investments Will Pay Off for the Public Sector

Here at Splunk we’ve been looking ahead to 2023 through our annual predictions for the public sector. This report is once again published alongside our leadership insights and emerging trends, IT and observability, and security editions. The new year presents many challenges that will affect the public and private sectors alike, including economic volatility, intensifying cyberattacks, the tech talent shortage and more.

SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security

In December, CrowdStrike reported that beginning in June 2022, the CrowdStrike Services, CrowdStrike® Falcon OverWatch™ and CrowdStrike Intelligence teams observed an increase in the targeting of telco and BPO industries. CrowdStrike Intelligence attributed this campaign with low confidence to the SCATTERED SPIDER eCrime adversary.

Centralized Log Management: Why It's Essential for System Security in a Hybrid Workforce

Remote work increased due to Covid-19. Now heading into 2023, remote or hybrid workplaces are here to stay. Surveys show 62% of US workers report working from home at least occasionally, and 16% of companies worldwide are entirely remote. With a hybrid workforce, security breaches from sources were less typical with in-office work.

Audit: Force audit policy subcategory settings

Audit: Force Audit Policy Subcategory is a security policy that allows users to leverage the most accurate and advanced policy settings in Windows Vista. The current version of the Active Directory does not have a feature for managing the audit policy settings, which is why the user has to manually apply Audit: Force Audit Policy Subcategory Settings and configure it to ensure everything works well.

What is DDoS-for-hire?

The term of the day is DDoS-for-hire, a service that allows anyone to purchase and carry out a distributed denial of service (DDoS) attack. This type of service is modeled after the Software as a service (SaaS) business model and is often profitable because it allows the operator of an Internet of Things (IoT) botnet to conduct a cost-effective attack.