Execute System Security Configuration Assessment Using Free CIS-CAT® Lite (Download, Run, Scan)
CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security, Inc.). CIS-CAT Lite helps users…
Learning, Sharing, Creating
CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security, Inc.). CIS-CAT Lite helps users…
This post summarizes how we can use Microsoft 365 to modernize our IT security. If you are doing it correctly,…
This post summarizes how we can use Microsoft 365 to modernize our IT security. If you are doing it correctly,…
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond…
The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security. …
Pi-hole or Pihole is a Linux network-level advertisement and Internet tracker blocking application[2][3][4][5] which acts as a DNS sinkhole[6] and optionally a DHCP server, intended for use on a private network.[1] It…
With McAfee ePO software, IT administrators can unify security management across endpoints, networks, data, and compliance solutions from McAfee and…
Github Project address: https://github.com/51sec/camera Camera Project Description This project is used to demonstrate how easy a web app can use your…
Adblock software in OpenWRT is a script running in your OpenWRT gateway to sort out those DNS queries that ask…
Thanks to IT Governance. It has compiled Cyber Attacks and Data Breaches list by month and year since 2014, might be…
Here are some experiences while using DarkTrace. I am putting them together as a note for myself.
The Solution CyberArk Endpoint Privilege Manager helps remove the barriers to enforcing least privilege and allows organizations to block and…