Up until recently there has always been an easy approach for demoing the reason to have a form of disk encryption to protect the integrity of not only your data but also the operating system from being tempered with. For ages now, Microsoft Windows contained executable files that could be launched before a user logged … Continue reading Bypassing Windows Defender to gain local system access
Recently I’ve changed jobs and joined a smaller company in the vicinity of my home. Still doing security stuff of course, but now with a focus on infrastructure again. As I soon discovered the company uses VMWare for it’s virtualization, which is great but a change for me personally. Having been a Hyper-V user for … Continue reading VMWare vSphere 6.7 Key Management with HyTrust KeyControl
Do you want to know a secret? You probably do, question is, would you like it if anyone else knew your secret as well? I am guessing not. That is why, on the Internet, we use encryption for the data that we send and receive, just to make sure that someone else is not listening … Continue reading Do you want to know a secret?