brandon lee writer

Brandon Lee

Networking
Storage
Virtualization

Brandon Lee has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.

Articles written by Brandon Lee

  • Toronto, Canada

    Government of Canada password policy and best practices

    Governments worldwide document specific guidance related to cybersecurity and define best practices related to protecting business-critical resources from attack. The Government of Canada (GC) provides detailed password guidance best practices to keep passwords from being compromised. In this review of…

    Read More
  • arrows in circle

    What’s new in PCI DSS V4.0

    Organizations that store, process, or transmit cardholder data fall under the compliance framework known as PCI-DSS (Payment Card Industry Data Security Standard). It helps protect cardholders and businesses dealing with cardholder data from cyber attacks and breaches. The PCI Security…

    Read More
  • two locks one open and one closed

    NIST 800-53 guidelines and requirements

    To help increase their cybersecurity posture and successfully meet compliance regulations, organizations must consult the latest guidance regarding security and privacy controls for securing business-critical data. The National Institute of Standards and Technology (NIST) is a respected authority for cybersecurity…

    Read More
  • coding with lock

    Virginia Consumer Data Protection Act

    The Virginia Consumer Data Protection Act (VCDPA) was recently signed, making it the second state that has signed a consumer privacy regulation into law. This legislation follows what was implemented in California by way of the California Consumer Privacy Act…

    Read More
  • shield with checkmark

    NIST MFA guidelines

    End-user passwords are often the weakest link in IT security, providing the path of least resistance for an attacker looking to penetrate business systems. Users commonly choose easy to remember, and consequently, easy to compromise passwords. In IBM's Cost of…

    Read More
  • blue gears

    2022-2023 NIST 800-63b Password Guidelines and Best Practices

    The most basic form of authentication is the password. Despite many advancements in cybersecurity, the username and password, although outdated, are still used as the most common form of authentication today. Enterprise environments have long used password policies to help…

    Read More
  • desktop and lock

    Active Directory reversible encryption explained

    If you have administered password policies in Active Directory or looked at the local policies present in the Windows client operating system, you may have noticed an interesting setting contained in the Account policies section. The setting is Store passwords…

    Read More
  • Windows password recovery tool

    How to delegate password reset permissions in Active Directory

    Least privilege access is a crucial part of security that protects against overprovisioning user permissions. Even with IT technicians, and junior administrators, this needs to be considered when configuring permissions in the environment. A case in point is helpdesk staff…

    Read More
  • Scan Your AD

    Active Directory privilege escalation

    There is no shortage of vulnerabilities and risks in today's digital world. Attackers are using any way possible to compromise business-critical data. However, one of the prevalent ways cybercriminals can get a foothold into your environment is by compromising user…

    Read More
  • security lock

    TCP port 21 FTP vulnerabilities

    Since the birth of the Internet, one of the exciting capabilities it has enabled is the ability to transfer data from one place to another over long distances. One of the first protocols designed for transferring files from one node…

    Read More