Michael Brooke presents the ASD essential 8 on Safari; recently I had the opportunity to work with TechforGood, an organisation making a difference with Social… Read More »Michael Brooke presents the ASD essential 8 on Safari
Protection before Detection – Endpoint detection response Endpoint Detection and response gets a lot of attention from the entire cyber security industry, EDR as it… Read More »Protection before Detection – Endpoint detection response
Microsoft Defender for Endpoint training resources: The goal of this page is to put together a level 101/201 resource for consultants and end customers to… Read More »Microsoft Defender for Endpoint training resources
The Easy Fail in critical infrastructure should have all of us worried right now, whether it is the water being turned off, the traffic lighting systems that we all rely on to get around the cities we live in or much worse, the Electricity that we used to power our homes and provide us warmth and comfort (who am I kidding here, internet access and powered on devices are the only thing I care about) – there is a huge problem waiting around the corner for all of us.
SIEM – Security Information & event Management platforms are mature cyber security solutions, often having come from a legacy of application log gathering with the data being used for availability and performance as well as access management, it has been a simple and logical transition into security log gathering and analysis of that data for Indicators of Compromise (IoC) and other suspicious actions that might relate to an attack in progress
Cyber Security assessments are critical to understanding where your organisation is maturity wise.
Privileged Access Management, cyber attacks often still operate primarily on the premise that a logged in user has privileged access to their workstation or Laptop, this aspect has never changed despite platform providers ‘improving’ their security models over time.