﻿<?xml version="1.0" encoding="utf-8"?><!--RSS Genrated: Tue, 14 Apr 2026 07:28:11 GMT--><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:ev="http://purl.org/rss/1.0/modules/event/"><channel><title>Taur Productions - Security</title><link>https://www.taurproductions.com:443/blog/rss/category/1443/security-1</link><atom:link href="https://www.taurproductions.com:443/blog/rss/category/1443/security-1" rel="self" type="application/rss+xml" /><description>RSS document</description><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[ADFS Certificate Maintenance Part 2]]></title><link>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-2</link><description><![CDATA[ The solution 

 Some research indicated that the process of exporting the certificate to a pfx file and reimporting the file would do the trick but that clearly hadn’t worked in this case. ...]]></description><pubDate>Mon, 04 Jun 2018 19:23:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-2</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2890]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[ADFS Certificate Maintenance Part 1]]></title><link>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-1</link><description><![CDATA[ Scenario 

 It seemed like a straightforward job – update the service communications certificate for an ADFS farm with web applications proxies in front of it but, somewhere along the line ...]]></description><pubDate>Tue, 29 May 2018 20:32:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/adfs-certificate-maintenance-part-1</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2928]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Setting up DKIM and DMARC records Part 3]]></title><link>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-3</link><description><![CDATA[ DMARC   Adding the DMARC record    DMARC  (Domain-based Message Authentication, Reporting & Conformance) records are rather more interesting as they are additional to SPF and DKIM – as in you need ...]]></description><pubDate>Thu, 26 Apr 2018 19:24:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-3</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2891]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Setting up DKIM and DMARC records Part 2]]></title><link>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-2</link><description><![CDATA[ 4. Setting up DKIM and DMARC records Part 2 In the second part, the DKIM records for the solution are deployed 

 Part 2 

 The Solution 

 It was decided therefore to separate the corporate – ...]]></description><pubDate>Mon, 16 Apr 2018 19:27:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-2</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2892]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Setting up DKIM and DMARC records Part 1]]></title><link>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-1</link><description><![CDATA[ The scenario 

 Another interesting one where the solution ended up being more complex than initially thought, it was determined, after a successful migration from an inhouse Exchange based email ...]]></description><pubDate>Sun, 15 Apr 2018 19:28:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/setting-up-dkim-and-dmarc-records-part-1</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2893]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Data Security and The Small Business Part 3]]></title><link>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-3</link><description><![CDATA[ Now that you have determined where all that personal data is in the myriad of file shares and databases that you use, what do you do next? You will remember that, way back in the first part, I ...]]></description><pubDate>Mon, 20 Nov 2017 20:31:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-3</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2895]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Data Security and the Small Business Part 2]]></title><link>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-2</link><description><![CDATA[ Identifying that personal data 

 Firstly, let’s clarify what data were are trying to protect. The forthcoming EU GPDR legislation is only concerned with personal data so, in terms of your future ...]]></description><pubDate>Tue, 31 Oct 2017 20:33:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-2</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2896]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Data Security and the Small Business Part 1]]></title><link>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-1</link><description><![CDATA[ Policies are your friend (sort of) 

 With the impending doom that is the GDPR (General Data Protection Legislation) soon to be upon us, it occurred to me that, once again, the EU plutocrats have ...]]></description><pubDate>Tue, 17 Oct 2017 19:34:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/data-security-and-the-small-business-part-1</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2898]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[The Future of the Technical Design Authority]]></title><link>https://www.taurproductions.com/blog/the-future-of-the-technical-design-authority</link><description><![CDATA[ Many large organisations have a Technical Design Authority to ensure that any IT project is compliant with organisational standards especially in regard to capacity, strategy and security. Well, ...]]></description><pubDate>Sun, 01 Oct 2017 19:37:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/the-future-of-the-technical-design-authority</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2901]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Penetration Test Remediation Approach]]></title><link>https://www.taurproductions.com/blog/penetration-test-remediation-approach</link><description><![CDATA[ Penetration Test Remediation Approach 

 Penetration tests are a fact of life for most of us who fund themselves forever cursed to work in the field if IT and they are, generally speaking, a very ...]]></description><pubDate>Sun, 24 Sep 2017 19:38:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/penetration-test-remediation-approach</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2902]]></dc:identifier></item></channel></rss>