• Home
  • /Articles posted by ' Andrew Alaniz '

Archives

Risk of using VNC in an Enterprise Environment

VNC is a protocol used by a number of products for remote viewing and control of devices.  I am also including services such as X11 in this discussion.  Ultimately, this includes any remote viewing software that is not native to an application that runs persistently on the end device. Identity Access Management Software like this, ... Read More
 

WannaCry – Sifting Through The Hype

There has already been a number of blog posts and analysis of the WannaCry ransomware attack.  I am not going to attempt to add any detail to that.  I do find it helpful to have a consolidated list of well sourced resources. Bottom Line Rollout MS17-010 to any systems that don’t have it If you ... Read More
 

IaaS and the Shared Responsibility Model

  A note to vendors: Infrastructure as a Service (IaaS) != secure/compliant applications, it can, but doesn’t by default. Why are people putting their servers and applications in IaaS providers like AWS and Azure? They can get a cheap, fast and secured data center to host their servers/applications. But that doesn’t mean they get the ... Read More
 

Personal: Family Goals for 2017

I won’t do this often, but this turned out to be a fun exercize with my family.  I was inspired by a friend of mine to have more family meetings. Specifically, a meeting to reflect on the last year and discuss how we did as a family, what we want to change and how we ... Read More
 

NIST Guide for Cybersecurity Incident Recovery

NIST, National Institute for Standards and Technology, just released a new guide for incident response and recovery for a cyber security incident. What is a Cyber Security Incident? According to NIST Special Publication 800-61, Computer Security and Incident Handling Guide, an event is any observable occurrence in a system or network. Events include a user ... Read More
 

Top Cyber Security Concerns for Non Profits

Of course there could be a number of items on this list, and many that are important.  These are the top cyber security concerns that I see for non profits right now (and any business of similar size).  Attackers look for easy targets.  Sure it is possible to compromise even the most hardened enterprise systems, ... Read More
 

Cyber Security and Non Profits

Running a non-profit is much like running a small business, and it also has many unique challenges.  In a small business, it is easy to justify overhead spending on IT equipment as a necessity to running the business even during times of fiscal struggle.  In a non-profit, when you have to weigh spending money on ... Read More
 

Windows Event Forwarding/Collector Resources

Depending on your SIEM you are going to have different requirements here.  For some SIEMs, there is no issue with EPS and only the number of devices.  In that case, this will immediately reduce your licensing needs by allowing you to watch Events from Servers and/or workstations from a single (or few) devices.  You can ... Read More