What are some of the ways of identifying trade-offs between security & privacy?

Privacy can mean different things to people. Protecting one’s identity from autocratic regimes to ex-boyfriend/girlfriends/partners. Threat modeling goes some way in understanding actors and the potential options in mitigating these.
Guide… Continue reading What are some of the ways of identifying trade-offs between security & privacy?

How to find deprecated versions of SSL and TLS with MS Defender’s Advanced Threat Hunting

I’ve been trying to figure out how to construct a query in MS Defender’s Advanced Threat Hunting, to find machines with open SSLv2, SSLv3, and TLSv1.0 ports. If possible, it should be straightforward for someone who knows what they’re doin… Continue reading How to find deprecated versions of SSL and TLS with MS Defender’s Advanced Threat Hunting

What are the security issues in Plug and Play architecture? And how we can mitigate them?

I am developing a solution that is mostly dependent on plug and play architecture. Currently, I am doing a risk analysis of this design.
What are the security issues in Plug and Play architecture? And how we can mitigate them?
This is a C#… Continue reading What are the security issues in Plug and Play architecture? And how we can mitigate them?