Tag: Security

Hit by a ransomware, what’s next?

Just had the incredible opportunity to do a session on stage at VeeamON 2023 in Miami and introduce Monaco Cyber! Still pretty cool to see a full house! We shared what happens during a ransomware attack and our best practices to react faster with efficiency. By sharing our combined experiences in France and Monaco, and …

Continue reading

Advertisement

Cybersecurity and Data in F1

F1 is as much about speed as it is about technology. Approximately 100-300 sensors on a F1 car. F1 technology has supercharged the world, the car is like a “computer”. F1 is dictated by information technology nowadays. Without computer data, there is no success in F1.  

Continue reading

Advertisement

[Release] Veeam v12 launch event

I invite you to participate in Veeam v12 launch event week next, February 14! Veeam keynote speakers will present Veeam Backup & Replication v12 as the foundation of the new

Continue reading

Advertisement

Kerberos Authentication with Veeam v12

Kerberos Authentication with Veeam v12. NTLM authentication is still mandatory for communication between all Veeam infrastructure servers in v11. However, NTLM authentication is still required for communication between Veeam backup infrastructure servers (backup server, backup proxies, backup repositories, guest interaction proxies, log shipping servers, and mount servers). NTLM was subject to several known security vulnerabilities …

Continue reading

Identify a piece of malware with Yara

Yara rules classify and identify malware samples by creating descriptions of malware families (it is a tool used to identify files, based on textual or binary pattern). YARA rules are like a piece of programming language, they work by defining a number of variables that contain patterns found in a sample of malware. If some …

Continue reading

error

Enjoy this blog? Please spread the word :)