top of page
The HUB
Featured Posts
Scott Blake
Oct 85 min read
Limiting Domain Controller Attack Surface: Why less services, less software, less agents = less exposure.
This article is a guide to making the best-informed decisions by companies asking the right questions.
Darryl Baker
Jul 167 min read
Securing The Chink in Kerberos’ Armor, FAST! Understanding The Need For Kerberos Armoring
35 years after the first public version of Kerberos, attacks on it are still coming fast and furious. Time to armor up.
Scott Blake
Oct 17, 20238 min read
Return of The LDAP Channel Binding and LDAP Signing
It has been over two and a half years since we first touched on the subject of LDAP channel binding and LDAP signing.
Demetrios Mustakas
Mar 18, 20224 min read
Securing VMWare ESXi Part 4: Host Certificates and VIBs
This is the fourth part of a multi-article series exploring ESXi hypervisor architecture and its many security features.
Demetrios Mustakas
Jan 14, 20224 min read
Securing VMWare ESXi Part 3: Host State Controls
This is the third part of a multi-article series exploring ESXi hypervisor architecture and its many security features.
Demetrios Mustakas
Jan 7, 20224 min read
Securing VMWare ESXi Part 2: Access Controls
In this article Demetrios Mustakas focuses on physical and network access controls for VMWare ESXi .
Demetrios Mustakas
Jul 6, 20213 min read
Securing VMWare ESXi Part 1: ESXi Host Versions
In this article we are going to focus on the importance of version & build of the ESXi hosts as well as monitoring the uptime of hosts.
bottom of page