Rupert Marais has spent years in the trenches of Windows defense and incident response, with a focus on endpoint hardening, device security, and network controls. In this conversation, he unpacks how an architectural blind spot in RPC can let a low-privileged process ride a legitimate connection
Lead: The Surprise Setup That Wouldn’t Stay Finished Few phrases on a corporate PC triggered more anxiety than a chipper banner announcing “You’re almost done setting up your PC,” surfacing months after the actual setup had been completed and right when a user needed to get work done. The timing
Rupert Marais is our in-house Security specialist with deep, hands-on experience in endpoint and device security, cybersecurity strategy, and network management. He’s worked through the quirks of Windows NT and Windows 95 to today’s modern builds, coaching teams through pranks that turned into
Rupert Marais has spent years on the front lines of mobile security, witnessing the constant evolution of how threat actors infiltrate the devices we trust most. As an expert in endpoint protection and network management, he has observed a sophisticated shift in tactics, moving away from obvious
The silent integration of a seemingly harmless notification tool into dozens of financial applications recently nearly turned into a gateway for digital bank robbery on a global scale. This alarming scenario became a reality when a vulnerability was discovered in a widely used software development
Rupert Marais is a veteran security specialist who has spent years on the front lines of endpoint protection and network management. As an expert in navigating the complexities of device security and enterprise-level defense strategies, he brings a pragmatic, battle-tested perspective to the
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43