What information does the Microsoft Intelligent Security Graph use for querying files?

I’m looking into WDAC and the option to use Microsoft’s ISG for files that are not explicitly allowed or denied caught my interest. Unfortunately I haven’t been able to find any information on what is sent to the ISG to make the known good… Continue reading What information does the Microsoft Intelligent Security Graph use for querying files?

Understanding FDE: Is the encrypted Linux protected against a compromised boot volume?

I use this initramfs-based FDE on my headless server. My motivation is to secure my system against physical tampering.
I am aware that securing an untrusted hardware is not possible. This question is more about understanding how things wor… Continue reading Understanding FDE: Is the encrypted Linux protected against a compromised boot volume?

Is there any guideline or procedure for 4G hardware equipement (4G landline phone and home Wifi router) security audit/assessment?

I need to perform a security audit/assessment on 4G LTE hardware equimements :

4G landline wireless phone (not android OS but with many features such as WiFi hotspot)
4G Wifi home router

Is there any standard/guideline/procedure (or any … Continue reading Is there any guideline or procedure for 4G hardware equipement (4G landline phone and home Wifi router) security audit/assessment?