search
top

InfoSec-Jobs.com – A rare Cyber Security job listings site

I wanted to post about a very cool one-of-a-kind cyber security job listing website. If you are looking into getting a job specializing in cyber security, you are in luck!  One of my friends has created a website dedicated towards connecting like minded cyber security professionals and hiring managers.

What is InfoSec-Jobs.com?

It is a highly focused website listing out only cyber security positions. You can check out the website here: https://infosec-jobs.com/

It has listings that only consist of security focused and related jobs or positions. If you are a hiring manager, it is a great place that allows you to post your current open positions if you are looking for some talented cyber security professionals.

The website also does not sell your personal information, CV/Resume details to any other parties, and no external trackers are used on the site. The website is built to protect every user’s personal information.

It is a rare website, as most other IT job related websites showcase various IT positions. There are none that really focus just on cyber security positions. So this is a new rare gem to check out and bookmark!

Read More Of This Post

Recover Keys – Part 2 – Scanning Devices on the Network

In this Part 2 review of Recover Keys, we will look at how we can scan machines via the network. For most users, I don’t believe this option will be used too often. The average home user that purchase a license for personal use could just uninstall and install the tool on each machine they want to grab license keys off of, or buy a license for multiple machines.

For larger organizations this tool is excellent as it can be installed in one location on a single machine. You also get the ability of being able to extract the license keys via the network, which makes this tool much more efficient and valuable. At the end of the day it is all about saving and making the best use of time.

If you haven’t read Part 1 of using Recover Keys (scanning a local machines) you can check it out here: https://www.stealthbay.com/recover-keys-part-1-scanning-a-local-machine/

Read more Of This Post

Network Security for IP Camera’s

Network Security for IP Camera’s & Video Surveillance Systems

These days many devices have some form of interaction with our networking devices and the internet itself! What people forget is much like our desktops, laptops and mobile devices. All of these other types of devices need to be secured. The average person is going to assume no security is needed and that the product itself is already fairly secure by default. In my personally opinion, I’d say the default security settings are usually not sufficient enough to keep the device and your network safe.

I’ve created a guide below of procedures that can be followed to enhance the security measures for your IP Camera’s and systems.

IP Camera Hardening Guide

I’ve created a hardening guide below that will look at a few key components that administrators will want to make use of in their network.

  • Passwords
  • LDAP/AD Authentication
  • VLAN’s
  • 802.1X Authentication
  • Disabling Network Ports
  • Disabling Unused Services
  • MAC Address Filtering
  • Physical Access Control

(more…)

top