This content was generated with the assistance of AI. The information has not been validated. AGIX is not an insurance company. Do not use this information to make your insurance decisions. Here is a comparison table highlighting the coverage categories of General Business Liability Insurance versus Cyber Insurance, including categories
Read moreBrowse our Cybersecurity technical articles here. We’re sharing our knowledge with fellow cybersecurity practitioners in the hope that we can all progress further and faster in protecting our information systems.
pfSense Cannot allocate memory with pfBlockerNG – Firewall Rules Not Working
This article discusses the cause and solution to the error message “Cannot allocate memory” relating to pfBlockerBG. In this scenario, we’re using a Netgate 2100 Base firewall appliance. The firewall was receiving the following error message when reloading the filter rules (in “Status – Filter Reload“). There were error(s) loading
Read more
Advert Blocking Comparison Between pfBlockerNG & AdBlocker
This article is a quick comparison of advert blocking for web browsing between pfBlockerNG DNS filtering, and the web browser plugin Ad Blocker. This is hardly scientific, but it does give an idea of how effective each are with basic settings. I’m sure with more effort, the impact could be
Read more
Disable Weak TLS Versions on Windows Server 2019
This article explains how to manually disable weak TLS versions on Windows systems. Make sure you have a backup or recovery option as we’re making changes to the Windows Registry. Open the Registry and head to: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols Right click on “Protocols” in the left column, and select “New” -> “Key”.
Read moreDisable Weak Cipher Suites on Windows Server 2019
This article explains how to remove a weak Cipher Suite on a Windows Server 2019 system. There’s other ways such as Power Shell. This is just one way. Make a backup or snapshot first as mistakes could cause issues reconnecting. I organise a maintenance window, take a VM snapshot first,
Read moreProtected: CISM – My Study Notes
There is no excerpt because this is a protected post.
Read moreA Quick Understanding of Cipher Suites
This article explains the structure of a cipher suite. A cipher suite is a description of a combination of cryptographic algorithms that a system supports, expects or proposes. The description includes a means to create and exchange asymmetric keys, the type of symmetric keys to use, and the hashing algorithm
Read more
Windows Built-In VPN to pfSense
This article demonstrates the settings required on Windows and pfSense to get a Windows Built-In VPN to work between the two. It’s actually pretty easy. This article is more a confirmation of settings than a guide. Make sure you have the firewall rules configured on the pfSense WAN interface. We’re
Read moreBackups Are 1% Of The Solution
The title is a little provocative, but hear me out. My argument is that in most situations, resorting to restoring data from backups means the project or business is already in an untenable position. Suppose Kym from the Accounts department overwrites a document and asks for the file to be
Read moreExpand a LUKS Encrypted Volume
This article demonstrates how to extent a LUKS encrypted volume. We’re using Ubuntu 22.04 and the volume is non-root. Although you could probably do the same on the root volume (partition). This is risky and you should not do this without a backup and understanding the likelihood of failure. This
Read more