Security

Infographic titled 'Beyond WSUS: Embracing Modern Windows Update Management' showcasing various update management solutions for Windows environments. It features a central cloud icon labeled 'Windows Update for Business' with arrows pointing to different update management approaches: AD domain-joined physical infrastructure managed through Configuration Manager, Azure AD domain-joined cloud services managed in Microsoft Intune, and group policy-managed devices configured to connect to WUfB for updates.

Beyond WSUS: How to Build a Modern Windows Update Management System

For years, Windows Server Update Services (WSUS) has been a go-to solution for IT teams managing Windows updates. However, Microsoft’s decision to deprecate WSUS signals a shift toward modern, cloud-native update management. While WSUS will continue to function for now, its limitations—manual patching, scalability issues, and lack of third-party application support—make it an outdated choice […]

Beyond WSUS: How to Build a Modern Windows Update Management System Read More »

Decoding Cybersecurity: Choosing Between EDR, MDR, XDR, SOC, and MSSP

In today’s rapidly evolving digital landscape, cyber threats are more sophisticated, frequent, and damaging than ever before. Businesses face everything from ransomware attacks and phishing schemes to insider threats and supply chain compromises. With the stakes higher than ever, choosing the right cybersecurity solution has become a critical business decision. Adding to the complexity is

Decoding Cybersecurity: Choosing Between EDR, MDR, XDR, SOC, and MSSP Read More »

Front view of a commercial airplane approaching for landing with landing lights on against a cloudy sky

Case Study: How to Strengthen Cybersecurity for a Top 10 Domestic US Airline

A top 10 domestic US airline found itself under attack when a foreign adversary gained unauthorized access to its network. This intrusion posed a severe risk to the airline’s operations, customer data, and overall reputation. With an active threat in progress, the airline needed immediate incident response and strategic security enhancements. Over the course of

Case Study: How to Strengthen Cybersecurity for a Top 10 Domestic US Airline Read More »

"Business meeting with professionals discussing tasks on a flip chart in a modern office setting"

Case Study: How to do Cybersecurity Across a Distributed Organization

Overview: A group of eight subsidiaries of a healthcare company located in the New England area of the US faced a significant wake-up call when a cyber incident exposed vulnerabilities across their organization. With each subsidiary operating independently, using disparate technology stacks and security controls, the group realized they lacked the necessary defenses to protect

Case Study: How to do Cybersecurity Across a Distributed Organization Read More »

Hashicorp Vault – Configure Authentication

There are many authentication methods for Hashicorp vault. This article describes how to configure LDAP authentication and Userpass Authentication LDAP Authentication: The following command will configure LDAP to point at a domain controller named mydomaincontroller.mydomain.com. It will then search the search base for groups to the top of mydomain.com domain: After you have configured vault

Hashicorp Vault – Configure Authentication Read More »

Sepia-toned image of an old rusty padlock securing a wooden door, symbolizing robust security measures

Unlocking Security: Master Your Hashicorp Vault Rekey and Unseal Process

In the realm of modern data security, safeguarding sensitive information is paramount. Hashicorp Vault stands out as a critical tool for managing secrets and protecting data by keeping sensitive credentials, such as API keys and passwords, securely encrypted. When Vault is started or restarted, it enters a “sealed” state. In this state, its encryption keys

Unlocking Security: Master Your Hashicorp Vault Rekey and Unseal Process Read More »

"Futuristic robotic hand interacting with abstract digital network on a blue background, symbolizing advanced technology and cybersecurity."

Why CrowdStrike Complete MDR is the Future of Security

The Cybersecurity Status Quo is Failing The cybersecurity landscape is evolving at an unprecedented pace, and traditional security solutions are struggling to keep up. Ransomware attacks surged by 62% in 2023, with the average cost of a data breach reaching $4.45 million (source). Cybercriminals are no longer just targeting endpoints—they are infiltrating entire networks, exploiting

Why CrowdStrike Complete MDR is the Future of Security Read More »