Broadcom acquires Vmware
Read More: Broadcom acquires VmwareThis article is an opinion piece and is solely the authors views mixed with a little bit of external data and any of the following should be taken as personal opinion. Broadcom seeking to acquire VMware – too big to fail. Update – Broadcom acquires VMware! Update: I have written about the next 12 months…
Microsoft Defender for Endpoint training resources
Read More: Microsoft Defender for Endpoint training resourcesMicrosoft Defender for Endpoint training resources: The goal of this page is to put together a level 101/201 resource for consultants and end customers to utilise to find out more about Defender for Endpoints, I will update the details as they change but this is current as of May 2022. Microsoft Defender for Endpoint training…
Microsoft Office app licensing for MSPs utilising RDS
Read More: Microsoft Office app licensing for MSPs utilising RDSMicrosoft Office app licensing for MSPs utilising RDS – short answer is, if you are an Managed Service Provider (MSP) and you are not a Qualified Multitenant Hoster (QMTH) then you can not provide the Microsoft Office apps via Remote Desktop Services (RDS) to your clients. Recently this question was given to me to answer…
Trend XDR – Microsoft sentinel Integration
Read More: Trend XDR – Microsoft sentinel IntegrationUsing Trend XDR – Microsoft sentinel Integration is an excellent way to connect to additional sources of telemetry data and add this to your corporate instance of Microsoft Sentinel for SIEM and SOAR capabilities. I discovered this article this morning in my feed and thought it would be great to share as it is a…
Easy Fail – Australian critical infrastructure
Read More: Easy Fail – Australian critical infrastructureThe Easy Fail in critical infrastructure should have all of us worried right now, whether it is the water being turned off, the traffic lighting systems that we all rely on to get around the cities we live in or much worse, the Electricity that we used to power our homes and provide us warmth…
Why do businesses not do cyber security!
Read More: Why do businesses not do cyber security!for very long), everything a business spends money on that does not make money is an expense and some expenses are more critical than others.
Once the horse has bolted – or detection and response should not be an early stage cyber resilience control
Read More: Once the horse has bolted – or detection and response should not be an early stage cyber resilience controlOr in other words detection and response solutions should not be a first step in a cyber resilience strategy – after the horse has bolted is too late to be worried about how the animal got out of the stable. The Australian Cyber Security Centre does not even list Endpoint detection and Response solutions in…
Vendor acquisitions not good for existing clients
Read More: Vendor acquisitions not good for existing clientsVendor acquisitions not good for existing clients – please prove me wrong… Kaseya has announced their acquisition of Datto for $6.2 Billion. Kaseya is a leader in the Managed Services software space and also less favourably was breached in 2021, Datto for their part is a leader in the managed backup and recovery market for…
Microsoft Autopatch – Patch Tuesday is gone for good!
Read More: Microsoft Autopatch – Patch Tuesday is gone for good!Microsoft Autopatch – Patch Tuesday is gone for good! As an ex-systems administrator my life back in the good ol’ days was busy. Waiting for the next patches Testing the new patches Deploying the new patches …….. rolling back the new patches where it causes a legacy printer or other device to no longer function!…
Cyber Attack Vectors 2022; where marketing and reality diverge
Read More: Cyber Attack Vectors 2022; where marketing and reality divergeCyber Attack Vectors 2022; where marketing and reality diverge. The Identity Theft resource centre ‘Q1 2022 Data Breach Analysis’ report is an interesting 2022 report with a not surprising result to many cyber security professionals. Human Error is the number One source of cyber breach The number one attack vector “Cyber attack” is in-fact Human…