Bypassing an EDR
Read More: Bypassing an EDRFollowing Blue team security researchers is extremely fascinating. The battleground of Blue teams vs cyber criminals is constantly moving forward. The linked article below is a security researchers demonstrating how to avoid detection with most EDR solutions. combining all of our knowledge, we now can practically use everything we want, under the radar, evading the…
ACSC Essential Eight #1
Read More: ACSC Essential Eight #1Commence your cyber security resilience journey with the ACSC Essential eight, the ACSC is short for the Australian Cyber Security Centre and the ACSC the central source for all things related to the Australian Government cyber security strategy. The ACSC is not the sole source of truth and most of the ACSC recommendations do relate…
“inventory stock” for Facebook, is you!
Read More: “inventory stock” for Facebook, is you!But you know that already! Interesting comparison in the linked article below and somewhat equivalent , though the post “person” selling our private information could not go as far as Facebook has been able to unhindered. In my opinion it is not that my data is being sold which is an issue, it is the…
Empathy in cyber security
Read More: Empathy in cyber securityEmpathy, the ability to understand the feelings of others as if we are in their shoes. Have we as cyber security professionals really thought that the target of a Malware attack is not us when we evaluate our cyber security posture? It is almost never the business leader or the person reading these articles that…
The problem is NOT Cyber security!
Read More: The problem is NOT Cyber security!The “Compliance with the NSW Cyber Security Policy” special report released on the 28th October 2021 should be a serious concern to every NSW resident who has their Personally Identifiable Information being “securely” held by a government agency. Vic, NSW, QLD, SA, NT and TAS could very likely be transposed with NSW and these findings…
Hyperbole – Cyber incident response
Read More: Hyperbole – Cyber incident responseHyperbole (love the word!) ….. I would be disappointed if my business leaders thought that my security team could not respond to a cyber incident. The linked article describes that business leaders do not feel their organisation could respond to a cyber incident. So what is the problem? The article is not an accurate impression?…
AV NGAV EDR XDR MDR AMDR
Read More: AV NGAV EDR XDR MDR AMDRThe cyber security landscape has seen huge expansion and growth in the past 5 years and End Point Detection and Response (EDR) has been one of the biggest areas of expansion. https://www.morphisec.com/hubfs/2020%20State%20of%20Endpoint%20Security%20Final.pdf According to Ponemon Institute, 68% of organisations suffered one or more endpoint attacks that successfully compromised data or IT Infrastructure. In 2018 Gartner…
Sinclair Broadcasting Breach
Read More: Sinclair Broadcasting BreachStory: Another ‘murican Fortune 500 company breached and affected by a Ransomware attack. With Broadcasters, retailers (online and store), NBN service providers, BNPL, Transport, Tourism (lol), some utilities etc etc….. there is an immediate cost to your business profits from an outage, customers are not patient and will go elsewhere immediately and buy their product…
Data is difficult!
Read More: Data is difficult!Know your Data? (link below)….. Data is difficult, Categorising and securing Data is difficult, I personally rate this as a 4 or 5 out of 5 stars in my Cyber Security complexity Framework. Meaning that it is my opinion that this is not the place that most organisations looking to reduce their Cyber Risk should…
6502 – coming back to life?
Read More: 6502 – coming back to life?For those who know what the above is then kudos to you 😀 I grew up using an Atari 130XE with a 1.7 MHZ 6502C and as my first computer I loved it and the freedom it created for me to program and to play games! The 6502 is coming back to life in a…