Is it safe to disable SATA ports in the BIOS to isolate the corresponding hard drives from malware?

I have three SATA hard drives that I use every day. Suppose I disable the corresponding SATA ports of these hard drives through my BIOS, add another storage device to my PC, install another instance of Windows 10 and run unsafe executables… Continue reading Is it safe to disable SATA ports in the BIOS to isolate the corresponding hard drives from malware?

Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network … Continue reading Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

Taking Zero Trust Network Access to The Next Level

What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a… Continue reading Taking Zero Trust Network Access to The Next Level

Endpoints and Network Segmentation Best Practices

Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered amon… Continue reading Endpoints and Network Segmentation Best Practices

Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security

Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks. Continue reading Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security