Artificial Intelligence – Managed Detection and Response
Read More: Artificial Intelligence – Managed Detection and ResponseTwo buzzwords applied to almost all Cyber Security companies products today are: Artificial Intelligence and Machine Learning or AI and ML. What exactly the AI or ML technology in these solutions and managed service offerings we consume are providing, is open to debate; as is the depth of implementation and integration. However there are great…
shutting down a phishing site
Read More: shutting down a phishing sitePhishing is one of if not the highest success rate cyber security attacks that we are likely to suffer. According to the FBI’s Internet Crime Complaint Centre (IC3), phishing accounted for 30,48% of all received complaints in 2020, making it the area with the highest victim count. https://www.techradar.com/author/fernando-cassia Being that most of my readers have an…
Human error, human error, ho hum…
Read More: Human error, human error, ho hum…Do the easiest(cheapest) thing first that give your the biggest benefit or the first 80% of a job takes 20% of the time, both statements lead to a conclusion that it is most efficient to work on what is going to be most affordable and easy first. The article I have linked reports that the…
Single Sign On (sso)
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
Read More: Single Sign On (sso)redentials, that credential is able to be used by each system querying a central system (Authentication service) to provide the user access to a service or system. This is different from a Password manager or “Screen Scraping” where a user name and password is “replayed” into the session.
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
101 Cyber security primer
Read More: 101 Cyber security primerCyber Security assessments are critical to understanding where your organisation is maturity wise.
Data Leakage Protection, preventing loss of data
CSF framework: 1. Identify; 2. Protect; 3. Detect; Cyber Maturity Level:⭐️⭐️⭐️⭐️
Read More: Data Leakage Protection, preventing loss of dataWho owns the Data? does the business expect SecOps or IT to manage? (Hint: very often “yes”) Where is the budget for managing the DLP solution coming from after implementation? Is the business going to accept the inconvenience of DLP rules “upsetting” their daily workflows” Will the business get sufficient value from the ongoing investment…
CSF framework: 1. Identify; 2. Protect; 3. Detect; Cyber Maturity Level:⭐️⭐️⭐️⭐️
Starting out – New Security officer
Read More: Starting out – New Security officerStarting out with an organisation and don’t know where to start?
Privilege access Management
Read More: Privilege access ManagementPrivileged Access Management, cyber attacks often still operate primarily on the premise that a logged in user has privileged access to their workstation or Laptop, this aspect has never changed despite platform providers ‘improving’ their security models over time.
Partnering done right
Read More: Partnering done rightResellers are ambulance chasers! They came into the deal after I had already sold the product to the customer and wanted to make money from my hard work, I’m the vendor sale rep, I know what the customer needed and I sold it! I’ve lost count of the number of times that I’ve heard words…
The Trouble with SharePoint today
Read More: The Trouble with SharePoint todayThe history of SharePoint has brought the corporate world to its latest emergency in the IT data centre. Firstly, SharePoint sites proliferated because they could be run on a desktop with Windows SharePoint Services (WSS), SharePoint server released in 2001 through to SharePoint 2013/2016 and SharePoint Online (an optional component of Office 365) often without…