Easy Fail – Australian critical infrastructure
Read More: Easy Fail – Australian critical infrastructureThe Easy Fail in critical infrastructure should have all of us worried right now, whether it is the water being turned off, the traffic lighting systems that we all rely on to get around the cities we live in or much worse, the Electricity that we used to power our homes and provide us warmth…
Why do businesses not do cyber security!
Read More: Why do businesses not do cyber security!for very long), everything a business spends money on that does not make money is an expense and some expenses are more critical than others.
Once the horse has bolted – or detection and response should not be an early stage cyber resilience control
Read More: Once the horse has bolted – or detection and response should not be an early stage cyber resilience controlOr in other words detection and response solutions should not be a first step in a cyber resilience strategy – after the horse has bolted is too late to be worried about how the animal got out of the stable. The Australian Cyber Security Centre does not even list Endpoint detection and Response solutions in…
Vendor acquisitions not good for existing clients
Read More: Vendor acquisitions not good for existing clientsVendor acquisitions not good for existing clients – please prove me wrong… Kaseya has announced their acquisition of Datto for $6.2 Billion. Kaseya is a leader in the Managed Services software space and also less favourably was breached in 2021, Datto for their part is a leader in the managed backup and recovery market for…
Microsoft Autopatch – Patch Tuesday is gone for good!
Read More: Microsoft Autopatch – Patch Tuesday is gone for good!Microsoft Autopatch – Patch Tuesday is gone for good! As an ex-systems administrator my life back in the good ol’ days was busy. Waiting for the next patches Testing the new patches Deploying the new patches …….. rolling back the new patches where it causes a legacy printer or other device to no longer function!…
Cyber Attack Vectors 2022; where marketing and reality diverge
Read More: Cyber Attack Vectors 2022; where marketing and reality divergeCyber Attack Vectors 2022; where marketing and reality diverge. The Identity Theft resource centre ‘Q1 2022 Data Breach Analysis’ report is an interesting 2022 report with a not surprising result to many cyber security professionals. Human Error is the number One source of cyber breach The number one attack vector “Cyber attack” is in-fact Human…
The cyber security herd effect
Read More: The cyber security herd effectClose your eyes and imagine the African Savannah, you are a “be”wildebeest grazing away happily when an alert is raised and the entire herd of 100s of animals suddenly takes to the plains to outrun whatever the alarm was raised for. This time it was a single lioness looking for an easy meal, but the…
Sandboxing with Windows 10 – Microsoft Defender Application Guard
Read More: Sandboxing with Windows 10 – Microsoft Defender Application GuardSandboxing with Windows 10 – Microsoft Defender Application Guard, the feature to sandbox suspicious or unknown documents has been in Windows for some time and is very useful in preventing Malware from Office macros and other runtime nasties from being able to infect your machine. Sandboxing allows applications / documents etc to run inside their…
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Read More: An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack VectorsAn Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. Recently I wrote about EDR failure to detect and respond to cases of Advanced Persistent Threats here after discovering a research paper on the topic when researching the use of Machine Learning in cyber security Detection and response solutions such…
Microsoft Defender Endpoint Deployments
Read More: Microsoft Defender Endpoint DeploymentsRecently I have been deploying Microsoft Defender for Endpoints into my lab environment as a part of my job function. I am responsible for aiding resellers and Managed Service Providers (MSP) to implement Microsoft Security solutions for their business customers. Personally I have been working with tech for many years but almost always using Microsoft…