Kerberos is one of the more secure options that you have when deploying a network. It is also one of the more complex and intimidating options (maybe that contributes to it’s security 😉 ). But it is worthwhile to deploy in a network to increase security when accessing resources, and since a major component of … Continue reading Constrained Kerberos Delegation & BlueCoat ProxySG
Assume that you’ve been hacked…
That’s the title of this recent Forbes.com article. Many, especially management, would ask “where is the hard evidence that our company is hacked? Why should I implement all this security if I’m not being hacked?”. The problem with today’s security landscape is that such hard evidence is difficult to provide before actual security systems are … Continue reading Assume that you’ve been hacked…
You must be logged in to post a comment.