Budgies have taught me…
Read More: Budgies have taught me…I think it is worth taking the risk on new talent, when that talent shows the other capabilities that we are looking for but falls short on the technical know-how because technical know-how is the easiest part of working in a team.
Endpoint Detection Response Assessment = Fail
Read More: Endpoint Detection Response Assessment = FailEndpoint Detection Response Assessment = Failure of virtually all current leading Endpoint detection and response solutions to detect a range of ‘known’ attack methods. Throughout this work, we went through a series of attack vectors used by advanced threat actors to infiltrate organizations. Using them, we evaluated state-of-the-art EDR solutions to assess their reactions, as…
SIEM – Security Information & event management
Read More: SIEM – Security Information & event managementSIEM – Security Information & event Management platforms are mature cyber security solutions, often having come from a legacy of application log gathering with the data being used for availability and performance as well as access management, it has been a simple and logical transition into security log gathering and analysis of that data for…
EDR, XDR – NDR
Read More: EDR, XDR – NDRWith the uptake of Cyber Security solutions by clients globally it was only a matter of time for EDR tools to be mainstream for customers as it is today in 2022. NDR is also starting to make progress towards mainstream adoption in 2021 as detailed in the below image.
Conditional Access
Read More: Conditional AccessConditional Access is a Microsoft technology focused on making businesses more secure.
99.9% reduction in risk from cyber attack, the best ROI available in cyber
Read More: 99.9% reduction in risk from cyber attack, the best ROI available in cyberMulti Factor Authentication or MFA for short, is an additional security measure (Factor) added after an authentication attempt has occurred to ensure that the “entity” who entered the user name and the password is in fact the entity that should know the user name and the password.
PASS – Mandatory 25 NSW Government report
Read More: PASS – Mandatory 25 NSW Government reportPASS – Mandatory 25 NSW Government report. Mandatory 25 NSW Government requirements: Personally as an Australian by choice so proud to find out that the government of Australia is creating material like the “‘Mandatory 25’ Requirements for Cyber Security”, proving that Australia is taking cyber security seriously across government at all levels. I have attached…
MS 900 – Microsoft 365 Fundamentals
Read More: MS 900 – Microsoft 365 FundamentalsStarting with a new company called rhipe has required me to go and certify in the various Microsoft security solutions portfolio. Rather than provide a lot of detail on how to pass the exam I wanted to collect together the information that I used so that you can find the details yourself and use these…
“Statisticising” cyber security
Read More: “Statisticising” cyber securityLast night I went fishing in our new boat and we caught 2 Dusky Flatheads, ugly but a great eating fish, sorry I digress but it seemed important at the time, here they are – we had no time to name them: Sorry I got distracted – a challenge with the modern day, living in…