CIS Benchmarks + CDM + MITRE ATT&CK: Strengthening Cybersecurity Defense

Reading Time: 3 minutesIn today’s rapidly evolving digital landscape, organizations face an ever-increasing threat of cyberattacks. To fortify their defenses, they must adopt a comprehensive approach that combines industry standards, advanced detection mechanisms, and proactive strategies. In this blog post, we explore the Read More …

Zerto Reference Architecture

Reading Time: 2 minutesIn the ever-evolving landscape of IT infrastructure, ensuring robust data protection, disaster recovery, and seamless multi-cloud mobility is paramount. Zerto, a leading solution in this domain, offers a comprehensive platform that empowers organizations to safeguard their critical workloads and maintain business Read More …

Implementation of Endpoint Security along with EDR/XDR, Server Security, Email Security Gateway with DLP & Digital Risk Management Solution

Reading Time: 2 minutesLet’s delve into the world of endpoint security and explore the various solutions available to fortify your organization’s defenses. Image Courtesy: What is EDR? EDR vs. MDR vs. EPP Security – Critical Start Consider a combination of EDR, XDR, and Read More …

Enhancing Cybersecurity: Systems Security Engineering with NIST 800-160

Reading Time: 2 minutesThe National Institute of Standards and Technology (NIST) plays a pivotal role in guiding cybersecurity practices, and one of its key publications, NIST 800-160, provides a comprehensive framework for Systems Security Engineering (SSE). In this blog post, we’ll delve into Read More …

Securing the Digital Perimeter: Navigating IAM Strategies for a Zero Trust World

Reading Time: 2 minutesIn the relentless landscape of cybersecurity threats, the traditional notion of a secure perimeter has become obsolete. Organizations are increasingly adopting a Zero Trust approach, redefining their Identity and Access Management (IAM) strategies to safeguard against evolving threats. This blog Read More …

SOC Services, Playbooks and Responsibilities

Reading Time: 3 minutesA Security Operations Center (SOC) plays a crucial role in an organization’s cybersecurity strategy by monitoring, detecting, responding to, and mitigating security incidents. The SOC provides various services, utilizes playbooks, and assigns specific responsibilities to ensure effective cybersecurity operations. Here’s Read More …

OS Feature Comparison: Windows, Linux, Mac

Reading Time: < 1 minuteThis document is prepared for official needs, and is proven to be vital where a new or growing company needs to standardize their internal laptop’s OS. We were to choose a standardized OS that needs to be put in, into Read More …

Complete Network Diagram for 500 Users Using Microsoft Solution

Reading Time: < 1 minuteBelow is the complete diagram for an organization for 500 users. This design includes the following Microsoft Services: Page-1: Complete Design Topology Page-2: Exchange Server 2013 Design Topology with DAG Page-3: Lync Server 2013 Design Topology with PSTN Page-4: Active Read More …

Microsoft System Center 2012 R2 Configuration Manager: List of Default Reports

Reading Time: < 1 minuteRecently an organization requested to perform a quick asset management (inventory) along with some reports from the SCCM 2012 R2 I’ve recently deployed. More than 2500 devices were enrolled in a period of a month. and by default: we have Read More …

Windows Search: Find Files Modified on a Specific Date

Reading Time: < 1 minuteIt’s a rather small & interesting post regarding searching files by it’s modified date. To some extent this knowledge became essential  when people are handling too many office files. So, on a specific date how do you search for modified Read More …

DNS Resource Record Types

Reading Time: < 1 minuteDNS resource records can be used to provide DNS-based data about computers on a TCP/IP network. Well I don’t know if there is a network other than TCP/IP network, other than the internal isolated lab network for engineering purposes. Anyway, Read More …