WAZUH Open source security platform
Read MoreWAZUH Open source security platform is a fork of OSSEC, it has been around since 2015 as a product and is growing in adoption. What is Wazuh Wazuh is an eXtended Detection and response platform that does not claim any level of either: Artificial Intelligence Machine Learning or, that it is easy These are the…
Oceanleaf Microsoft Defender tutorials
Read MoreOceanleaf Microsoft Defender tutorials, just came across what looks like an amazing resource for those who want to know more about Microsoft Defender and its capabilities. https://oceanleaf.ch Discovered on Reddits r/cybersecurity subreddit, a very good place to get upto date information and opinion on everything cyber security. https://www.reddit.com/r/cybersecurity/
Budgies have taught me…
Read MoreI think it is worth taking the risk on new talent, when that talent shows the other capabilities that we are looking for but falls short on the technical know-how because technical know-how is the easiest part of working in a team.
Endpoint Detection Response Assessment = Fail
Read MoreEndpoint Detection Response Assessment = Failure of virtually all current leading Endpoint detection and response solutions to detect a range of ‘known’ attack methods. Throughout this work, we went through a series of attack vectors used by advanced threat actors to infiltrate organizations. Using them, we evaluated state-of-the-art EDR solutions to assess their reactions, as…
SIEM – Security Information & event management
Read MoreSIEM – Security Information & event Management platforms are mature cyber security solutions, often having come from a legacy of application log gathering with the data being used for availability and performance as well as access management, it has been a simple and logical transition into security log gathering and analysis of that data for Indicators of Compromise (IoC) and other suspicious actions that might relate to an attack in progress
Conditional Access
Read MoreConditional Access is a Microsoft technology focused on making businesses more secure.
99.9% reduction in risk from cyber attack, the best ROI available in cyber
Read MoreMulti Factor Authentication or MFA for short, is an additional security measure (Factor) added after an authentication attempt has occurred to ensure that the “entity” who entered the user name and the password is in fact the entity that should know the user name and the password.
Go Passwordless!
Read MoreImplementing the right MFA solution will provide additional security to your business / organisation while actually improving your security as well.
PASS – Mandatory 25 NSW Government report
Read MorePASS – Mandatory 25 NSW Government report. Mandatory 25 NSW Government requirements: Personally as an Australian by choice so proud to find out that the government of Australia is creating material like the “‘Mandatory 25’ Requirements for Cyber Security”, proving that Australia is taking cyber security seriously across government at all levels. I have attached…