How to mitigate the risks of using new, third party imported electronic accessories?

As someone who is naturally good at recognizing risk and who are striving to maintain a wholistic view on security, I’m wondering how to evaluate and reduce the risks of hardware accessories (I.e. charging plug-ins, Thunderbolt cables), sp… Continue reading How to mitigate the risks of using new, third party imported electronic accessories?

Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals

The Center for Internet Security’s Critical Security Controls (“the CIS Controls”) are incredibly useful in helping organizations defend themselves against digital threats. By adopting the first five controls alone, it’s possibl… Continue reading Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals

When hardening a LINUX system what command line tools would you remove first in order to make an attackers life really difficult? [on hold]

When hardening a LINUX system what command line tools would you remove first in order to make an attackers life really difficult?

Continue reading When hardening a LINUX system what command line tools would you remove first in order to make an attackers life really difficult? [on hold]