Alfred Hall

Sign in

CyberSecurity Strategy

To enforce an effective CyberSecurity policy, company executives need a crisp and concise view of their cybersecurity landscape. An incomplete view of CyberSecurity issues results in the inability of the executives to adequately support their IT Ops / SecOps teams who are tasked with enforcing your CyberSecurity technical policy and…

One of the weaknesses in Active Directory and Windows environments that has been widely discussed but often overlooked in practice is the handling of System Administrator users and passwords. The short story is: For a compromised computer, we can essentially assume that an attacker can steal password credentials and hashes…

Oracle databases

Oracle databases like most other things come out of the box with default configuration, for example there are default passwords in place and sample users and databases if you have not be super careful in the installation process. …

Alfred Hall

CTO of the Nanitor CyberSecurity solution focused around Vulnerabilities and Security Configurations

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store