Hi everybody! Just a quick post to let you know about the release of Kali ‘the pentesters swiss army knife’ Linux has been released to the public! Check it out: https://www.kali.org/news/kali-linux-2019-4-release/ Amongst the most notable changes I found the ‘undercover mode’ that makes your Linux look like a Windows 10 machine, very cool!
Author archives: Jeroen Roegiers
Smart Spies – Security Research Labs
The smart people from German firm Security Research Labs have found some inventive ways to eavesdrop on your smart home assistants from Google and Amazon. Check their findings out here: https://srlabs.de/bites/smart-spies/ Be careful with the adaptation of smart assistants in your home is the lesson learned here…
CIS Controls
The Center for Internet Security has a nice list of controls that you can use to gauge the IT security level of your enterprise. Start at the bottom and get that first levels right, then work your way up the ladder. Need some help? Contact me!
CanaryTokens
A quick and easy way to monitor what is going on in your environment! https://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html
Cyber Kill Chain
Do you want to know more about how advanced adversaries go to work? Some smart guy at Boeing figured out a way to categorize the steps of an attack. Look no further, here it is: https://www.sans.org/security-awareness-training/blog/applying-security-awareness-cyber-kill-chain
Change management
Implementing security controls means that your workforce will have to adapt: welcome change management! Read this great article on what is needed for implementing changes: https://www.linkedin.com/pulse/managing-complex-change-stephanie-blackburn-freeth/ This general strategy also applies to the implementation of security controls and procedures.
Crown Jewels
You want to start investing in getting your security posture more mature? But where do you start? Well, it’s actually pretty simple: start by defining what your crown jewels are. What are the most valuable assets to your company? What is of utmost importance to the functioning of the enterprise?Then start thinking about how you …
2 Factor Authentication
Secure your email via 2FA!Office 365GsuitePro tip: don’t use sms tokens for authentication but use an ‘authenticator’ app on your smartphone instead.