ℹ️This blog post is part of a series of posts that delve into Application Control on Windows. This series will explore the risks involved in not controlling applications, as well as the ways in which we can control what is allowed to execute in our environments. Why it pays to be careful what software you allow in your org When approving...
Docker is a tool allowing administrators the ability to easily deploy applications and services. Used correctly, it can be a very powerful in allowing known configurations to be replicated and deployed quickly and easily in a consistent manner. Containers have a known state on initialization, and (generally) run a single service at a time, making the services they encapsulate easier to understand...
We all know that it is important to ensure that our services and systems are regularly backed up. Recently, I have had a number of people asking about backups for Docker volumes - particularly with reference to Homebox (https://homebox.software/) which I help to maintain. Backing up the containers Backing up the docker volumes For my requirements, I need to backup...
It's always DNS. Even when it's not. The issue As we know, the internet is full of potentially malicious sites, which our users, families and significant others can navigate to at any moment. It is important that, where possible, we mitigate this risk. There are a number of ways to do this, from DNS sinkholes to manual host...
Introduction USB devices and external media continues to pose a very real and immediate threat to businesses around the world, introducing a potential attack vector for malicious files from keyloggers to ransomware. Whilst it’s easy to say to disable USB media entirely, sometimes it is not possible to do so - particularly where external media is used by your suppliers or...