Chris Lazari

Information Security, Cloud Computing & Other Technologies of Interest

Page 2 of 2

Yahoo – A Quantifiable Cost for a Data Breach

Yahoo posted a security advisory on December 14th, 2016 advising all users of a second data breach. This breach has resulted in a data compromise of over 1 billion user accounts and could cost Yahoo’s shareholders dearly. Second Data Breached… Continue Reading →

Input must be of the form {key =”value”[;key=”value”]}

As part of my investigation into Microsoft’s new Nano Server I hit an unusual WinRM error that had me going round in circles for quite a while. I finally figured out what the issue was and decided to post this… Continue Reading →

Creating an SMTP Service on Windows Server 2016

From time to time you may need an SMTP service to relay mail from an internal application. I generally create these services for applications which only need to send mail from an internal network segment. A good example would be… Continue Reading →

How to Spot a Phishing Email

The vast majority of IT security breaches start with a phishing campaign. This statistic should not be a surprise to you as the human element is after all the weakest link in the security chain. The best way to defend… Continue Reading →

Your Website’s Weakest Link

Sucuri recently released a report that once again shows the issue of poorly trained website administrators is the key security weakness being exploited when websites being hacked. The report clearly shows that the majority of hacked websites were breached as… Continue Reading →

Newer posts »

© 2017 Chris Lazari

Up ↑