ultimatewindowssecurity.com
Blog
https://www.ultimatewindowssecurity.com/blog/default.aspx?p=5c8c0c1b-1027-4b76-bc62-311421f04ee4
Security, et al. Randy's Blog on Infosec and Other Stuff. Laquo; Help me! Don’t Create a Different . Enriching Event Log Monitoring by Correlating Non Event Security Information. Wed, 03 Jun 2015 09:35:13 GMT. Identify information from your directory (e.g. Active Directory). Environmental information (both internal and global). Threat intelligence feeds available from security organizations. There’s a growing array of threat intelligence feeds ranging from community-based free feeds to those commercially...
ultimatewindowssecurity.com
Return Policy
https://www.ultimatewindowssecurity.com/returnPolicy.aspx
All sales final. Defective items must be returned within 30 days for replacement. Please contact us at info@ultimatewindowssecurity.com if your shipment was damaged or have defective items. All training events are cancellable and refundable 15 days or earlier of the event. No refunds issued within 14 days of the event for cancellations but you will be credited towards a future event. When and Why Encryption Doesn’t Protect Your Data Against Malware. Coping with the Challenges of Exchange Mailbox Auditing.
ultimatewindowssecurity.com
Randy's MS Patch Analysis
https://www.ultimatewindowssecurity.com/patchAnalysis/ptoHistory.aspx
Patch Monday: Lightest Month This Year. Patch Tuesday: Print Spooler Attacks Possible. Patch Tuesday: No Active Attacks. Patch Tuesday: 2 Active Attacks and Adobe Flash. Patch Tuesday: 6 Critical Patches with Exploits in the Wild. Patch Tuesday: Client Side Attacks. Patch Tuesday: IE and Adobe Flash. Patch Tuesday: IE Support for Older IE Versions Ending. Patch Tuesday: Month of Arbitrary Code Execution. Patch Tuesday: Lots of Vulnerabilities but No Active Attacks. Patch Tuesday: Huge Month for Patches.
ultimatewindowssecurity.com
Forgot My Password
https://www.ultimatewindowssecurity.com/forgotPassword.aspx
Enter Your Email Address:. When and Why Encryption Doesn’t Protect Your Data Against Malware. Coping with the Challenges of Exchange Mailbox Auditing. 25 User Behavior Analytics that Indicate Malicious Insider or Compromised Account. The Role of Log Monitoring and Management in Achieving IT Compliance. Security Log Quick Reference Chart. The Leftovers: A Data Recovery Study. Patch Monday: Lightest Month This Year " - sponsored by LOGbinder.
ultimatewindowssecurity.com
Blog
https://www.ultimatewindowssecurity.com/blog/default.aspx?p=25d89953-47f3-4bad-b964-3b5f94d82076
Security, et al. Randy's Blog on Infosec and Other Stuff. Laquo; Live with SecureAuth at R. Finally, a new and differ. Live at RSA: Visualize Your Network and Access Paths Correlated with Relevant Vulnerabilities. Thu, 23 Apr 2015 15:02:44 GMT. Here’s another cool thing I found, this time at Redseal’s. Goes beyond this by consuming the results from any vulnerability scanner. Redseal. Bull; references (0). 5 Indicators of Endpoint Evil. Live with Dell at RSA 2015. Powered by Bloget™. Anatomy of a Hack Dis...
ultimatewindowssecurity.com
Webinars by Randy
https://www.ultimatewindowssecurity.com/webinars/Default.aspx
Transcript of your webinars. Every month Randy hosts free webinars on a variety of information security topics. These sessions are fast, informative and practical. 1 CPE credit per webinar. PowerPoint slides provided so you can take notes. Can't find a webinar you registered for in the past? Audit Collection Services (ACS). The Role of Log Monitoring and Management in Achieving IT Compliance. 25 User Behavior Analytics that Indicate Malicious Insider or Compromised Account. Top 8 Security Features in Sky...
ultimatewindowssecurity.com
Blog
https://www.ultimatewindowssecurity.com/blog/default.aspx?p=4a0900eb-73bc-443b-b6a9-a9326c7ea4b8
Security, et al. Randy's Blog on Infosec and Other Stuff. Laquo; Mirazon Great Folks for. Live at RSA: Visualize Yo. Live with SecureAuth at RSA 2015. Thu, 23 Apr 2015 15:51:34 GMT. Darin Pendergraft from SecureAuth stopped by the UltimateWindowsSecurity booth (South 2240). Visit SecureAuth in the South Hall at booth 2107 and be sure to see their interactive product demo using the Oculus Rift! On premise solution is a virtual machine, so you know it’s housed on your hardware. You do have a physical a...
ultimatewindowssecurity.com
Blog
https://www.ultimatewindowssecurity.com/blog/default.aspx?p=6dcc3397-2295-4984-81ad-4e78b36d1242
Security, et al. Randy's Blog on Infosec and Other Stuff. Laquo; Making SIEM better by foc. Are You Listening to Your Endpoints? Tue, 04 Aug 2015 13:24:52 GMT. Moreover, some security technologies such as strong authentication are no defense if you have malicious code running on the endpoint of a strongly authenticated user. How do you detect and even prevent malware like this? Like everything it takes a defense-in-depth approach. Advanced 3. The key thing is to look for Event ID 4688. You want these eve...
ultimatewindowssecurity.com
Newsletter
https://www.ultimatewindowssecurity.com/newsletter/Default.aspx
I will provide news you can use about new resources, webinars and same day analysis of MS security updates. You can limit what subject areas I email you about using the check boxes below. We will not share the information you enter here. When and Why Encryption Doesn’t Protect Your Data Against Malware. Coping with the Challenges of Exchange Mailbox Auditing. 25 User Behavior Analytics that Indicate Malicious Insider or Compromised Account. Security Log Quick Reference Chart.
ultimatewindowssecurity.com
Page not found
https://www.ultimatewindowssecurity.com/itaudit/webinars/Default.aspx
This is probably due to the recent remodelling to my site. To help you find what you are looking for here's a list of top resources. When and Why Encryption Doesn’t Protect Your Data Against Malware. Coping with the Challenges of Exchange Mailbox Auditing. 25 User Behavior Analytics that Indicate Malicious Insider or Compromised Account. The Role of Log Monitoring and Management in Achieving IT Compliance. Security Log Quick Reference Chart. The Leftovers: A Data Recovery Study.
SOCIAL ENGAGEMENT