security
-
Computers
How to protect your passwords after breaches
Passwords are quickly becoming one of the most dangerous areas of securing your environment. Organizations go through much time, effort, and expense to implement security solutions to protect business-critical data, and yet, users in your organization may be using risky…
-
Security
Install Palo Alto VM Series in VMware vSphere
Recently, in the home lab, I have been doing a lot of lab networking configurations and testing various scenarios. Recently, thanks to the great guys at Palo Alto, I was able to get my hands on a VM-series firewall to…
-
Security
How U.S. Hospitals Can Protect Against Imminent Ransomware Threat
This has been a wild year in terms of imminent disasters and extenuating events that lead to disruptions across the board. If it weren’t enough that organizations have had to face the fallout and effects of a global pandemic, cybercriminals…
-
Security
Safe Internet Surfing for Kids
When it comes to setting up a safe way for your kids to access the Internet, it is becoming more difficult. Especially if you have small children, you want to set up many safeguards to be able to protect them…
-
Security
Untangle 16 New Features Including WireGuard VPN
When it comes to firewalls and UTM appliances, I have tried many of them over the years. However, a goto product that I have relied on for many different types and sizes of environments is Untangle. The product is super…
-
Security
Can Ransomware Affect an ESXi host?
A particular Reddit thread caught my attention that was posted to Twitter as of last night. The title of the thread is “Witnessed my first ESXi ransomware. Crypts VMs at datastore level“. It basically describes a nightmare scenario involving a…
-
Security
Easy Windows Server Just In Time Administration JIT
One of the core pillars of good security with Windows Server is role-based access and least privilege access to resources in your environment. One of the newer buzzwords with security related to your Windows Server environment is called Just in…
-
NSX-T
Enable VMware NSX-T 3.0 Distributed IDS Configuration
One of the great new features of VMware NSX-T 3.0 is the distributed IDS capabilities that it offers now as part of the platform. In the same way that NSX changed the game with firewalling with the distributed firewall, the…
-
vSphere 7
VMware vSphere 7 Security Features and Improvements
One of the many areas that have been majorly improved with vSphere has been the enhancements in security with the platform. VMware vSphere 7 represents the most secure vSphere release to date with many new features and capabilities on a…
-
Horizon View
VMware Unified Access Gateway UAG 3.8 Installation and Configuration
Considering the security of your end user computing environment that is accessed via remote connections is extremely important. When building out how your clients are going to access a VMware Horizon environment, you want to enable secure access. VMware has…