This post will explain how to activate the FIDO2 authentication in your Azure AD and then how a user can register a key in his/her profile.
Security
Generally, files attached to emails should be avoided for several reasons: Emails get heavier and some systems have size limitations You lose access to what is attached (with some exceptions, of course) Some systems might block specific extensions, and this is exactly what I am talking about But, since we […]
I am not the first one writing about red and blue teams. And I, for sure, will not be the last. Before going further, let me explain the reason for writing this post. The topic has been turning in my head for quite some time now. Still, I recently watched […]
Sometimes management is not seeing how vital is a cybersecurity program. A penetration test might help you to make them understand.
This post talks about the basic things you either must do or have to improve your security posture.
This is the second and final part.
This post talks about the basic things you either must do or have to improve your security posture.
This is the first part.
When talking about DNS filtering, one name that comes up is Pi-Hole. In this post, I explain how to install this great piece of software.
Virtual Private Networks, another essential item in our lives that without taking some considerations, can become a living hell. Ok, maybe I am exagerating…
A quick checklist to use when receiving suspicious emails that will help us ascertain whether or not it is phishing.
Domain names serve as memorizable names for websites and other services on the Internet. However, computers access Internet devices by their IP addresses. And it is a good idea to try to filtering them in order to prevent phishing.