Is Microsoft Purview going too far, or not far enough? Many things happen on a day to day basis within an organisation. Employees look for new roles, they reply to emails that could be less than 100% above board, but does this mean that Employers should be using policy to detect things like: Leavers, Corporate Sabotage, Gifts and Entertainment.
Once the horse has bolted – or detection and response should not be an early stage cyber resilience control
Or in other words detection and response solutions should not be a first step in a cyber resilience strategy – after the horse has bolted… Read More »Once the horse has bolted – or detection and response should not be an early stage cyber resilience control
Data Incontinence – when leaks sneak out
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
To prevent data being used against you in the future either through competitive, intellectual or malicious usage or publication? What should you do?
Client Access Security Broker (casb)
CSF framework: 1. Identify; 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:⭐️⭐️⭐️
A Client Access Security Broker is a an important component in an enterprise organisation. A Client Access Security Broker or CASB for short provides: 1. Identify; 2. Protection; 3. Detection capabilities for the organisation on the NIST CSF framework model. How it does this is by inspecting traffic that is being sent to and from the Internet, either just the source and destination or through deeper inspection of the contents of the data being transmitted between source and target.
Data Leakage Protection, preventing loss of data
CSF framework: 1. Identify; 2. Protect; 3. Detect; Cyber Maturity Level:⭐️⭐️⭐️⭐️
Who owns the Data? does the business expect SecOps or IT to manage? (Hint: very often “yes”)
Where is the budget for managing the DLP solution coming from after implementation?
Is the business going to accept the inconvenience of DLP rules “upsetting” their daily workflows”
Will the business get sufficient value from the ongoing investment
What Data needs “Loss Prevention”, is there a better way to do DLP, because maybe the business only needs to protect accidental emails etc (Hint: often yes)