Application Whitelisting

Application whitelisting (AWL) is a technology that has been used in the security industry for a long time but is not yet widely accepted in enterprise workstation environments. AWL is the opposite of blacklisting which is the model used in most antivirus software today. Traditional antivirus looks for malicious files by fingerprinting files on the […]

Securing Your Network Infrastructure – Free Auditing Tools

In this edition of our “Securing Your Windows Infrastructure” series, I’ll be talking about some great free tools offered by Netwrix. Netwrix was founded in 2006 and offers a comprehensive suite of commercial and free security tools, all focused around increasing visibility into the changes made to your Windows environment. Among their free tools, you […]

Case Study – McAfee ePO/MOVE for a billion dollar financial establishment

Use Case ArchetypeSC was recently approached by billion dollar global financial corporation to perform an assessment of their McAfee ePO, MOVE, and DLP upgrade implementation plan. They have an older, distributed ePO environment which consisted of separate consoles in AMER, EMEA, and APAC making administration of the overall environment difficult. While the ePO infrastructure was […]

Stagefright Exploit

The InfoSec community has seen a rise in attention grabbing names for security vulnerabilities over the last couple years like Heartbleed, Freak, Shellshock, and now the latest android vulnerability Stagefright. The Stagefright exploit is different though, its name is derived from the media engine baked into android OS since version 2.2. The Stagefright engine is […]

Black Hat

Black Hat, the organization that has been providing the IT industry with the latest in security research, development and trends for the better part of the last two decades, has done it again. Black Hat USA 2015 has come to a close. In traditional Black Hat fashion, researchers have left the security world buzzing about […]

Securing Your Windows Infrastructure – Microsoft Security Compliance Manager

Welcome to the second installment of Securing Your Windows Infrastructure. In the previous article, I talked about Domain and Server Isolation, a technique that can be used to isolate domain-joined systems from untrusted hosts and optionally to require encryption to and from systems containing more sensitive or confidential information. Today, I’ll be reviewing another low-effort, […]