“Okta parses passwords in clear text”, What does that mean to me? This is really NOT an Okta problem but an industry problem – my… Read More »“Okta parses passwords in clear text”, What does that mean to me?
Carrots, sticks and donkeys do improve cyber security, part 1. More specifically how to Use the ACSC recommendations to achieve cyber resilience augmented with what… Read More »Carrots, sticks and Donkeys do improve cyber security, part 1
The No.1 way to protect Data, Defender for Business and Premium, MSP’s and businesses looking for better coverage of the ASD Essential 8 with the… Read More »The No.1 way to protect Data, Defender for Business and Premium
Microsoft Defender Vulnerability Management dropping shortly for customers as an add-on for Microsoft Defender for Endpoint P2 or a standalone license. Vulnerability assessments and Management… Read More »Microsoft Defender vulnerability Management dropping shortly
Microsoft Defender for Endpoint training resources: The goal of this page is to put together a level 101/201 resource for consultants and end customers to… Read More »Microsoft Defender for Endpoint training resources
Once the horse has bolted – or detection and response should not be an early stage cyber resilience control
Or in other words detection and response solutions should not be a first step in a cyber resilience strategy – after the horse has bolted… Read More »Once the horse has bolted – or detection and response should not be an early stage cyber resilience control
Microsoft Autopatch – Patch Tuesday is gone for good! As an ex-systems administrator my life back in the good ol’ days was busy. Waiting for… Read More »Microsoft Autopatch – Patch Tuesday is gone for good!
Cyber Attack Vectors 2022; where marketing and reality diverge. The Identity Theft resource centre ‘Q1 2022 Data Breach Analysis’ report is an interesting 2022 report… Read More »Cyber Attack Vectors 2022; where marketing and reality diverge
Windows 10 Operating system hardening script: Whilst researching for my ACSC 40 mitigations document I came across a little gem for hardening Windows 10 OS’s.… Read More »Windows 10 Operating system hardening script
SIEM – Security Information & event Management platforms are mature cyber security solutions, often having come from a legacy of application log gathering with the data being used for availability and performance as well as access management, it has been a simple and logical transition into security log gathering and analysis of that data for Indicators of Compromise (IoC) and other suspicious actions that might relate to an attack in progress