- Extended Detection Response, Articles, Extended detection and response, Managed Detection Response, MDR, Network detection and response, WTH, XDR
EDR, XDR – NDR
Read MoreWith the uptake of Cyber Security solutions by clients globally it was only a matter of time for EDR tools to be mainstream for customers as it is today in 2022. NDR is also starting to make progress towards mainstream adoption in 2021 as detailed in the below image.
Michael Brooke
Categories
- ACSC
- ACSC essential 8
- Advanced Managed Detect Response
- AI
- Airlock Digital
- AMDR
- Application Control
- Articles
- Artificial Intelligence
- As Secure As Practical
- ASAP
- ASD
- ASD 8
- ASD essential 8
- Australian cyber security centre
- Azure Active Directory
- Azure Application Proxy
- Bombs
- Breach
- Business Email Compromise
- CASB
- CIS 18
- CISA
- CISA Scuba
- Client Access Security Broker
- Cyber risk
- Cyber Security Framework
- Data Loss Prevention
- Data Protection
- Defender for O365
- DLP
- DMARC
- Do something
- Endpoint Detection Response
- EndPoint Protection
- EPP
- Exam prep
- Extended detection and response
- Extended Detection Response
- Funny
- GDAP
- Hiring
- Identity Access Management
- Incident response
- Information Protection
- JGES
- Just good enough security
- Least privilege
- M365
- Machine Learning
- Malware
- Managed Detection Response
- MDR
- MFA
- Microsoft
- Microsoft Autopatch
- Microsoft Azure Active Directory
- Microsoft certification
- Microsoft Defender
- Microsoft Defender Application Guard
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint Server
- Microsoft Defender for Identity
- Microsoft Defender Vulnerability Management
- Microsoft Endpoint Manager
- Microsoft Intune
- Microsoft licensing
- Microsoft purview
- Microsoft Sentinel
- Mitre Att&ck
- ML
- MSP
- Multi factor Authentication
- multifactor authentication
- MVCS
- Network detection and response
- NIST CSF
- Open source
- Operating System Hardening
- PAM
- people
- Phishing
- Planning
- Privileged Access Management
- Process
- Protection
- Purview Information Protection
- Ransomeware
- Ransomware
- Sandbox
- SASE
- SCUBA
- Secure Access Service Edge
- Security Assessment
- Security information event management
- Security posture
- SIEM
- Single Sign On
- SSO
- Threat and vulnerability management
- Threat Hunting
- Windows 10
- Windows Autopilot
- Windows Sandbox
- WTH
- XDR
- Zero day
- Zero Trust Network Architecture
- ZTNA
Recent Posts
- 101: Basic Security Posture for WordPress
- 101: Introducing Microsoft Defender for Endpoint
- MSP’s Enable GDAP or lose access to your O365 customers
- Microsoft Sentinel – reducing spend and log complexity first
- Secure Cloud Business Applications – assess your security
Recent Comments
Tags
#acsc #asd8 #kicksecio #SecurityPosture 101 ACSC Artificial Intelligence ASD8 ASD 8 Breach cyber attack vectors Cyber Security Cyber security for business DAP Data leakage Data Loss Prevention Data Protection DLP Endpoint Detection response Extended Detection Response Hiring Just Good Enough Security Kicksecio Managed Detection Response Managed Service Provider MDR Microsoft Microsoft Autopatch Microsoft Defender Application Guard Microsoft Defender for cloud Microsoft Defender for endpoints microsoft licensing Microsoft sandbox Microsoft Sentinel okta PAM Privileged Access Management Sandbox Sentinel SIEM Single Sign On SSO Threat Hunting Trend XDR Zerotrust