Articles relating to IT Security

Pat Pruchnickyj
Wednesday, 15 March 2017 / Published in IT Security, Software Lifecycle Automation, Tachyon
WikiLeaks Tachyon revealed
By now you have probably all read the news about the cyber tools developed by the CIA and revealed in the WikiLeaks “Vault 7” revelations. Members of the public are naturally incensed at the fact that their TVs and smartphones can be used to eavesdrop on their conversations. What is less well known, but perhaps
1E unveils Tachyon: a new paradigm in IT
2017 promises to be a momentous year in 1E’s history. For one, it marks our 20th anniversary as a company. On a personal note, I couldn’t be prouder of what we’ve achieved in that time. It’s been a lot of work, and a lot of fun. Best of all, we enter our anniversary year safe
Keith Garner
Friday, 09 December 2016 / Published in IT Security, OS Deployment, Uncategorized, Windows 10
  As regular readers will know, we are very proud round these parts of the four – count ’em –  distinguished Microsoft MVPs we have in-house. So, as 2016 comes to an end, we have asked them to offer us their New Year reflections. First of all, we’ve got Keith Garner, Solutions Architect, 1E &
Andrew Levey
Monday, 25 July 2016 / Published in Free Tools, IT Security, Uncategorized
security
With cyber security breaches hitting the headlines on a frequent basis these days, it’s hardly surprising that security and privacy ranked 2nd in the top 10 IT management issues for 2016 in the most recent Society for Information Management (SIM) annual survey. While there’s no doubt that cyber hackers are getting more innovative in their
It’s really hard to put numbers on the benefits of many products or services. For example, could you justify upgrading from an old banger to a new Jaguar based on having a better infotainment system?  (Making such a decision is definitely tricky – if anyone can help me make my case to my financial advisor,
Pass the hash
They might sound like unlikely candidates to join the Four Horsemen of the Apocalypse, but at a 2014 TechEd event in Huston, Microsoft’s Nathan Ide and Mark Russinovich delivered a joint presentation, ‘Pass-the-Hash: How Attacks Spread and How to Stop Them’, that made a number of attendees a little bit… nervous. Ide and Russinovich were
Reboot Strategy
Given the importance of reboots and the pain that our users often feel when computers must be rebooted, every organization should have a reboot strategy. Hopefully we can minimize the pain in some ways, but at least some predictability will allow the users to know what to expect. As administrators, we can be sure we’re
Troy Martin
Tuesday, 28 June 2016 / Published in IT Security, Uncategorized, Windows 10
Beating malware with Device Guard and AppLocker
Last week was (unofficially) Device Guard week here at 1E. Not only did we have our Device Guard webinar, ‘Beating Malware with Device Guard and AppLocker’ (the second in our Windows 10 Security Webinar Series), but we also unveiled an exclusive white paper, ‘Understanding and Deploying Device Guard’. The former was very well attended, meaning
Understanding & Deploying Device Guard
Cyber-attacks commonly occur through applications, browsers, un-patched vulnerabilities, or social-engineering. Deploying Device Guard (a central feature in the suite of Microsoft’s Windows 10 security features) does not eliminate the possibility of being targeted for attacks, but it does significantly reduce the attack surfaces favored by bad actors and malware writers. What Device Guard does is
microsoft device guard
This week saw Apple unveil its macOS Sierra at WWDC. The new operating system includes updates to Apple’s malware protection feature for Macs, Gatekeeper, making it harder to disable, and arguably bringing it up to speed with Windows 10’s similar but more exacting Device Guard… Thus was completed what philosophers call a Hegelian dialectic, whereby