Nowadays most enterprises are using Active Directory for building their internal infrastructure. Therefore, it is important to understand common pitfalls and how to detect adversarial activities in the network.
On 2020-04-20, thefirst virtual meetingof the OWASP Vienna chapter took place. I (Thomas Kerbl - SEC Consult) was invited to talk about my experiences with Secure Software Development based onOWASP SAMM, the Security Assurance Maturity Model.
You have certainly read some articles with very good recommendations on IT security in the home office over the last few days. We have also looked at these articles and would like to add a few more helpful points.
SEC Consult has been observing the development and application possibilities of blockchain technologies for some time. These technologies could also be used in individual areas of security consulting. Within the scope of a recent research project, possible scenarios for the preservation of evidence after cyberattacks were examined in more detail.