Governance, Risk and Compliance
Do you have the resources and processes in place to document policies, procedures, and due diligence? How much security is enough? How...
Addressing CISA's Response to COVID
The Cybersecurity and Infrastructure Security Agency (CISA), is the nation’s risk advisor for the Nation responsible for improving cyber...
STEAM Student of the Month Nominations
Key Cyber Solutions (KCS) is accepting nominations for STEAM Student of the Month! Do you know of a High School or College student who is...
Active Directory Exploitation Part 2 - LLMNR/NBT-NS Poisoning
Disclaimer: Do not perform anything listed below unless you are a certified/hired penetration tester with proper written authorization...
Top Cybersecurity Firm Hacked
FireEye, on of the largest U.S based cybersecurity firms, with more than 3,000 employees and revenues exceeding $800M in 2019, disclosed...
Active Directory Exploitation Part 1 - First, The Basics
Today, I'm going to start writing a quick blog series that explores Active Directory, implementation, and most importantly, how it is...