The best hackers are Russian!
Read More: The best hackers are Russian!This story is in no way disrespectful to Russians, it is a tribute to one of the Russians I have had the pleasure of working with in my past. Several years ago in prior to my career change into vendor land, I used to be a team leader for a Server team in a large…
kicksec.IO
Categories
- ACSC
- ACSC essential 8
- Advanced Managed Detect Response
- AI
- Airlock Digital
- AMDR
- Application Control
- Articles
- Artificial Intelligence
- As Secure As Practical
- ASAP
- ASD
- ASD 8
- ASD essential 8
- Attack surface reduction
- Australian cyber security centre
- Azure Active Directory
- Azure Application Proxy
- Bombs
- Breach
- Business Email Compromise
- CASB
- CIS 18
- CISA
- CISA Scuba
- Client Access Security Broker
- Cyber risk
- Cyber Security Framework
- Data Loss Prevention
- Data Protection
- Defender for O365
- DLP
- DMARC
- Do something
- Endpoint Detection Response
- EndPoint Protection
- EPP
- Exam prep
- Extended detection and response
- Extended Detection Response
- Funny
- GDAP
- Hiring
- Identity Access Management
- Incident response
- Information Protection
- JGES
- Just good enough security
- Least privilege
- M365
- Machine Learning
- Malware
- Managed Detection Response
- MDR
- MFA
- Microsoft
- Microsoft Autopatch
- Microsoft Azure Active Directory
- Microsoft certification
- Microsoft Defender
- Microsoft Defender Application Guard
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint Server
- Microsoft Defender for Identity
- Microsoft Defender Vulnerability Management
- Microsoft Endpoint Manager
- Microsoft Intune
- Microsoft licensing
- Microsoft purview
- Microsoft Sentinel
- Mitre Att&ck
- ML
- MSP
- Multi factor Authentication
- multifactor authentication
- MVCS
- Network detection and response
- NIST CSF
- Open source
- Operating System Hardening
- Opinion
- PAM
- people
- Phishing
- Planning
- Privileged Access Management
- Process
- Protection
- Purview Information Protection
- Ransomeware
- Ransomware
- Sandbox
- SASE
- SCUBA
- Secure Access Service Edge
- Security Assessment
- Security information event management
- Security posture
- SIEM
- Single Sign On
- SSO
- Threat and vulnerability management
- Threat Hunting
- Windows 10
- Windows Autopilot
- Windows Sandbox
- WTH
- XDR
- Zero day
- Zero Trust Network Architecture
- ZTNA
Recent Posts
- Four actions for protection with Microsoft Defender for Endpoint
- Optus, Medibank and Latitude, YOU are responsible for your clients data
- CVE-2023-23397: Microsoft outlook vuln
- 101: Basic Security Posture for WordPress
- 101: Introducing Microsoft Defender for Endpoint
Recent Comments
Tags
#acsc #asd8 #kicksecio #SecurityPosture #wordpressSecurity 101 ACSC ACSC Essential 8 Artificial Intelligence ASD8 ASD 8 ASD Essential 8 Breach cyber attack vectors Cyber Security Cyber security for business Data leakage Data Loss Prevention Data Protection Defender365 DLP Endpoint Detection response Extended Detection Response Hiring Kicksecio Managed Detection Response Managed Service Provider MDR Microsoft Microsoft Autopatch Microsoft Defender Application Guard Microsoft Defender for cloud Microsoft Defender for endpoints Microsoft Intune microsoft licensing Microsoft sandbox Microsoft Sentinel okta PAM Privileged Access Management Sentinel SIEM Single Sign On SSO Threat Hunting