AiTM phishing attacks: What to do when MFA is not enough

Companies are now increasingly reliant on technology and the internet to conduct their business. With phishing attacks growing in sophistication, businesses must now utilize advanced technology and tools to defend themselves against attacks.

Which Cloud Deployment Method is Best for You?

The worldwide public cloud computing market continues to grow at an unprecedented rate and is expected to reach an estimated 495 billion U.S. dollars by the end of 2022, according to Statista. With benefits like lower operating costs, faster speed,...

Is it Time to Look at Virtual Desktops Again?

Virtual Desktops have held tremendous promise for organizations for a long while. From minimizing or even eliminating the need to purchase, maintain, and support end user computers, to having company data in a secure location, there have always been...

Active Directory Authenticated CIFS (Samba) File Sharing with Ubuntu Linux 22.04

A while back we looked at setting up both CentOS 8, and Ubuntu 20.04 CIFS (Samba) file server with Active Directory Authentication. This blog is going to go through the same exercise, except using Ubuntu Linux 22.04 LTS. While there are many...

SSSD Linux Active Directory Authentication: Joining a Domain Without VPN

We have a few earlier blog posts on setting up Linux based Samba file shares with Active Directory authentication.Similarly, there are many documents on the Internet on configuring LDAP authentication to Active Directory.However, very little has...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all