Reading Time: 2 minutesA disaster recovery plan (DRP) is a strategy that helps organizations recover their IT systems and data after a disruptive event, such as a natural disaster, a cyberattack, or a human error. A disaster recovery plan is important because it Read More …
Author: Shuvro
Some Common SOC Technologies in the Market
Reading Time: 2 minutesHere are some common Security Operations Center (SOC) technologies that play a crucial role in detecting, analyzing, and responding to security threats: A CSOC Manages all the above networked devices insights, data collected from log shipping Remember, a well-integrated combination of these Read More …
Implementation of Endpoint Security along with EDR/XDR, Server Security, Email Security Gateway with DLP & Digital Risk Management Solution
Reading Time: 2 minutesLet’s delve into the world of endpoint security and explore the various solutions available to fortify your organization’s defenses. Image Courtesy: What is EDR? EDR vs. MDR vs. EPP Security – Critical Start Consider a combination of EDR, XDR, and Read More …
Enhancing Cybersecurity: Systems Security Engineering with NIST 800-160
Reading Time: 2 minutesThe National Institute of Standards and Technology (NIST) plays a pivotal role in guiding cybersecurity practices, and one of its key publications, NIST 800-160, provides a comprehensive framework for Systems Security Engineering (SSE). In this blog post, we’ll delve into Read More …
Securing the Digital Perimeter: Navigating IAM Strategies for a Zero Trust World
Reading Time: 2 minutesIn the relentless landscape of cybersecurity threats, the traditional notion of a secure perimeter has become obsolete. Organizations are increasingly adopting a Zero Trust approach, redefining their Identity and Access Management (IAM) strategies to safeguard against evolving threats. This blog Read More …
SOC Services, Playbooks and Responsibilities
Reading Time: 3 minutesA Security Operations Center (SOC) plays a crucial role in an organization’s cybersecurity strategy by monitoring, detecting, responding to, and mitigating security incidents. The SOC provides various services, utilizes playbooks, and assigns specific responsibilities to ensure effective cybersecurity operations. Here’s Read More …
Measure and Improve Your Vulnerability Management Program Maturity
Reading Time: 2 minutesIn the rapidly evolving landscape of cybersecurity, staying ahead of potential threats is crucial. A well-established Vulnerability Management Program (VMP) is essential for organizations aiming to safeguard their systems and data. However, measuring and enhancing the maturity of your VMP Read More …
Choosing the Right Cyber Risk Quantification Model
Reading Time: 3 minutesNavigating Cybersecurity Waters: Choosing the Right Cyber Risk Quantification Model In the dynamic landscape of cybersecurity, organizations face an array of threats that constantly evolve. To effectively manage these risks, it’s essential to adopt a robust cyber risk quantification model. Read More …
The Service Integration Layer
Reading Time: 2 minutesI. Introduction In the ever-evolving landscape of information technology, businesses face the challenge of managing diverse applications, data sources, and services. The Service Integration Layer (SIL) emerges as a pivotal solution, providing a unified platform to seamlessly integrate, manage, and Read More …
SIEM & SOAR Better Together: How to Enhance Your Security Operations
Reading Time: 3 minutesSIEM & SOAR Better Together: How to Enhance Your Security Operations Security is a top priority for any organization, especially in today’s complex and dynamic threat landscape. However, managing security operations can be challenging, as security teams have to deal Read More …
Threat Modeling with STRIDE
Reading Time: 4 minutesOne of the most popular frameworks for creating threat models is STRIDE, which stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. These are the six categories of threats that can affect a system. To Read More …
Threat Driven Modeling in SOC
Reading Time: 2 minutesThreat Driven Modeling in CSOC is a methodology that aims to improve the cybersecurity posture of an organization by aligning its security operations with the current and emerging threat landscape. It involves identifying, prioritizing, and mitigating the most relevant and Read More …
Artificial Intelligence in Cybersecurity Operation Center
Reading Time: 21 minutesAI is a powerful tool that can enhance the capabilities and efficiency of security teams, but it also poses new challenges and risks. Therefore, it is important to design, deploy, and use AI securely, and to be aware of the potential Read More …
The Importance of Having a Data Scientist Team in Cyber Security Operation Center
Reading Time: 8 minutesThe Importance of Having a Data Scientist Team in Cyber Security Operation Center Cyber security is one of the most critical and challenging domains in the modern world. With the increasing volume and complexity of data, cyber threats, and attacks, Read More …
Firewall Protection
Reading Time: < 1 minuteFirewall Protection Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They establish a barrier between secured and controlled internal networks and untrusted outside networks, such as the Internet. Using Read More …
Network Device Configuration
Reading Time: < 1 minuteNetwork Device Configuration Proper configuration of network devices is crucial for maintaining a secure network environment. Misconfigured network devices can provide loopholes that can be exploited by cybercriminals. Using Network Device Configuration benchmarks, such as the CIS Benchmarks, offers several Read More …
VPN Access
Reading Time: < 1 minuteVPN Access Virtual Private Networks (VPNs) provide a secure connection to another network over the Internet. They can protect your web traffic from snooping, interference, and censorship. Some best practices for VPN Access: Use Strong Encryption: Always use a VPN Read More …
Enterprise Architecture Strategy (EAS)
Reading Time: 2 minutesEnterprise Architecture Strategy An Enterprise Architecture Strategy provides a long-term view of a company’s processes, systems, and technologies so that the organization can align its business strategy with its IT strategy. This alignment is crucial in ensuring that the organization Read More …
Change Management (CM)
Reading Time: < 1 minuteChange Management (CM) Change Management in cybersecurity involves the systematic approach to dealing with change, both from the perspective of an organization and the individual. A well-designed change management plan can help prevent security lapses during the transition process. Here Read More …
Privileged Access Management (PAM)
Reading Time: < 1 minutePrivileged Access Management (PAM) PAM is a solution that helps organizations restrict privileged access within an IT environment. It minimizes the risk of security breaches by ensuring that only authorized users can access sensitive data and systems. Here are some Read More …
Identity and Access Management (IAM)
Reading Time: < 1 minuteCybersecurity is a never-ending battle. As technology evolves, so do the threats that seek to exploit it. This blog post will delve into key areas of cybersecurity, including Identity and Access Management, Privileged Access Management, Change Management, Enterprise Architecture Strategy, Read More …
The Cost of Inaction in Cybersecurity
Reading Time: 2 minutesCybersecurity is not just a technical issue, but a strategic one that affects every organization and individual. Cyberattacks can cause major financial losses, damage to reputation, legal liabilities, and even physical harm. However, many organizations and individuals still underestimate the Read More …
Find Your Operating System’s Installation Date
Reading Time: < 1 minuteEver wondered, how you could find out the installation dates of your laptop/desktops operating system? Well for starters there are couple of ways you can do it. Instruction follows: 1st Way: Type the following command in the Command Prompt C:\systeminfo Read More …
Laptop Standardization for an Organization
Reading Time: < 1 minuteI have created this file long back and still am using it. Primary focus was to provide general user/technical users a standard laptop/desktop so that IT could manage these devices centrally rather having to cater to personal choices and end Read More …
OS Feature Comparison: Windows, Linux, Mac
Reading Time: < 1 minuteThis document is prepared for official needs, and is proven to be vital where a new or growing company needs to standardize their internal laptop’s OS. We were to choose a standardized OS that needs to be put in, into Read More …
Data Center Bridging (DCB)
Reading Time: < 1 minuteMicrosoft released a new feature that can be found in it’s recent editions of Windows Server 2016, and the client OS, Windows 10. Though it has been available in Windows Server 2012, but we will be focusing on the usefulness Read More …
Network Interface (NIC) Data Transfer Speed
Reading Time: < 1 minuteI have been continuously asked this question by my peers & juniors alike, but few seems to figure out the reality. Now, lets get into the business, first the basics: I believe everyone knows this: 8 bits = 1 byte Read More …
Complete Network Diagram for 500 Users Using Microsoft Solution
Reading Time: < 1 minuteBelow is the complete diagram for an organization for 500 users. This design includes the following Microsoft Services: Page-1: Complete Design Topology Page-2: Exchange Server 2013 Design Topology with DAG Page-3: Lync Server 2013 Design Topology with PSTN Page-4: Active Read More …
Microsoft System Center 2012 R2 Configuration Manager: List of Default Reports
Reading Time: < 1 minuteRecently an organization requested to perform a quick asset management (inventory) along with some reports from the SCCM 2012 R2 I’ve recently deployed. More than 2500 devices were enrolled in a period of a month. and by default: we have Read More …
Windows Search: Find Files Modified on a Specific Date
Reading Time: < 1 minuteIt’s a rather small & interesting post regarding searching files by it’s modified date. To some extent this knowledge became essential when people are handling too many office files. So, on a specific date how do you search for modified Read More …
DNS Resource Record Types
Reading Time: < 1 minuteDNS resource records can be used to provide DNS-based data about computers on a TCP/IP network. Well I don’t know if there is a network other than TCP/IP network, other than the internal isolated lab network for engineering purposes. Anyway, Read More …
Choosing a Name for Your Computer
Reading Time: < 1 minuteI believe every now and then people of networkers face this dilemma where we the IT guys are troubled with this silly matter. Apparently it seems silly but the impact of it is really grave. If you fail to plan Read More …
Use System File Checker (SFC) to Scan and Repair System Files & use DISM to fix files where SFC fails
Reading Time: 3 minutesSystem File Checker (SFC) is a command-line tool that scans all protected system files and replaces incorrect versions with correct versions. This tool originally built for Windows 2000!, and all GA editions were shipped with it. In other words, SFC Read More …
Windows Server Core to GUI Conversion
Reading Time: < 1 minuteThis particular request came from a friend who is running Windows Server 2012 R2 Core. And he wanted to install Microsoft Exchange Server 2016 on that server. Now I have read somewhere that Exchange Server 2016 requires full GUI support Read More …
Command line to get your Service Tag in Windows
Reading Time: 2 minutesI was actually looking up for the Service Tag of my DELL E 6410 machine. At the back of the laptop panel the sticker has already worn out, and I started browsing the TechNet. Now, I found the WMIC (Windows Read More …
Install GUI on Windows Server 2016
Reading Time: 2 minutesI really got amazed or even startled that the first boot Windows Server presented a command line, along with the server manager. I closed the server manager console; and got stuck 🙂 with the command line only. Laughed for couple Read More …
Enable BitLocker, and to Prompt for PIN During Startup
Reading Time: 3 minutesFirst you need to check if the following items are there in your laptop/server TPM Chip Windows 7 Enterprise or Higher (Ultimate with or without N) Windows Server 2008 R2 Enterprise or Higher You can achieve BitLocker encryption introduced into Read More …
Hyper-V Backup – FREE for 2 VM’s by Altaro
Reading Time: < 1 minuteNow, friends been asking if theres a free hyper-v backup software available or not. Personally I use it for my VM’s. Altaro released a FREE 2 VM model forever, as they have mentioned on their site….and I found no limitations Read More …
Windows Servers: DNS Ports
Reading Time: < 1 minuteThe default DNS port is 53. You can view the dynamic port range on a computer that is running Windows Vista or Windows Server 2008 computer by using the following netsh commands: netsh int ipv4 show dynamicport tcp netsh int Read More …
Windows 7 USB/DVD Tool – Make Your Own Bootable Memory Stick
Reading Time: 3 minutesMicrosoft has a tool and it’s so easy to make an ISO file to be transferred to a USB drive using the tool. It will readily create a USB bootable OS. Now download the file from the following link: Windows Read More …
Mobile Device Management (MDM) by N-Able
Reading Time: < 1 minuteThe MDM solution provided by the N-Able company which is a sub of Solarwind. I was wondering if there are companies who are looking for an MDM solution based on their specific requirements. And being amazed that recently a company Read More …
PowerShell 2.0 – ShutDown VM Script
Reading Time: < 1 minuteHere is the script for shutting down a Virtual Machine. Have a close look in the script and look for change needed, like your virtual machine name, exit reasons etc. This script is tested under Win2k8 and Win2k8R2 Environment. Thanks Read More …
Configuring PowerShell Web Access
Reading Time: < 1 minuteEver realized that Windows Server 2012 and Windows Server 2012 R2 has the PowerShell feature that can be run from Web Browser? YES it has that feature. Following is a screenshot of that: Now first thing you have to do Read More …
Configuring Two-Factor Authentication in Lync Server 2013
Reading Time: < 1 minuteA two factor authentication requires a domain username and then followed by a password, and afterwards a Certificate PIN or RSA PIN or similar or identical featured access types. Now in Windows Servers, implementing a Smart Card feature or a Read More …
Exchange Server 2013 – Manage Mailbox Databases
Reading Time: < 1 minuteThe following command would give you some serious level of statistics that can also be daunting for you 🙂 Get-MailboxDatabase <Database-Name> | FL The right side of the result is omitted, but focus on the left side of it, what Read More …
.NET Framework Deployment Guides
Reading Time: < 1 minuteI needed these for an SCCM deployment to some CBS (Core Banking Software) front-end software installation testing and it gave me hard time to find all of these at one go. I had to run these through multiple search engines Read More …
Block E-Mail Attachments on Mobile Devices
Reading Time: < 1 minuteEver curious about blocking users attachments from their mails? In their handheld devices? Run the following command to check if the policy is set or not as a default option for all mail boxes under Exchange Server. Get-ActiveSyncMailboxPolicy And since Read More …
CBT Nuggets – CISA Training Notes_IS Audit Process P1&2
Reading Time: < 1 minuteAnd here goes the class notes for the second day, the IS Audit Process Part 1 & Part 2. Access the pdf file here: 02_CISA Training Notes_IS Audit Process P1&2
CBT Nuggets – CISA Training Notes – Introduction
Reading Time: < 1 minuteAs you might have already know that CISA was an industry standard and becoming more and more popular as time passes. So, I got myself into the CISA training. The training conducted online with CBT Nuggets CISA training video. And Read More …
Deploy Microsoft Lync Server 2010 in Two Physical Servers
Reading Time: < 1 minuteThis brief solution document focuses on the deployment options regarding Lync 2010 in two physical servers. Hardware and Software Sizing as well as configuration are reflected within this document. This document also released in the Article section of this blog. Read More …