
Google, Apple, and Microsoft Go Passwordless
- Frank
- May 16, 2022
- Android
- Apple
- big ip
- big-ip
- cyber security
- darren kitchen
- dns
- dns poisoning
- Enterprise
- f5
- fido
- fido alliance
- hack
- hack5
- hacker
- Hak5
- information security
- infosec
- IP Addresses
- Kernel
- Microsoft
- passwordless
- penetration testing
- pentest
- pentester
- pentesting
- red team
- shannon morse
- snubs
- Technology
An enterprise vulnerability has public exploits, big brands are going passwordless, and install this android security patch asap!
Read More
Banking in Latin America: Planning for Hybrid Cloud | Part 2
- Frank
- July 21, 2020
- AKS
- Application Gateway
- architecture
- Azure
- Azure Front Door
- Azure in the Enterprise
- Azure Kubernetes Service
- azure networking
- Cloud Native
- cluster
- Deployment
- Developers
- dns
- Fernando Mejia
- Gateway Subnet
- Hadoop
- Hub
- Hybrid Cloud
- Hybrid Networking
- IP
- Kubernetes
- kubernetes cluster
- Lyle Dodge
- machines
- Microservices
- Microsoft
- Microsoft Azure
- network
- Network Peering
- Nodes
- On-Premises
- Pod
- Spoke topology
- sql database
- Virtual Firewalls
- Virtual Network
- VNET
- VPN
- Workloads
In this second part episode, Fernando Mejia walks through everything you need to plan for in a Hybrid Cloud architecture for Azure Kubernetes Service. This includes IP address concerns from on-premises to Azure, hub and spoke topology, as well as the different options you have in Azure Kubernetes Service. Watch Part 1 Learn more: https://azure.microsoft.com/en-us/overview/kubernetes-on-azure
Read More
How DNS Works
Speaking of infrastructure, did you ever wonder how do websites marry up to their IP addresses? Dr Mike Pound explains the Domain Name System – DNS in this Computerphile video.
Read More
How to Build an Active Directory Hacking Lab
- Frank
- January 4, 2020
- Active Directory
- active directory lab
- Cybersecurity
- dns
- dns takeover
- domain admin
- ethical hacking
- hacker
- hacking
- ipv6 attack
- ipv6 dns takeover
- kali linux
- kerberoasting
- lab build
- llmnr
- m4v3r1ck
- mitm6 tutorial
- pen testing
- penetration tester
- penetration testing
- pentesting
- takeover
- tcm
- the cyber mentor
- thecybermentor
- walkthrough
The Cyber Mentor explores the how and why you should build an Active Directory Lab in this cyber-security filled tutorial video.
Read More