Categories
- ACSC
- ACSC essential 8
- Advanced Managed Detect Response
- AI
- Airlock Digital
- AMDR
- Application Control
- Articles
- Artificial Intelligence
- As Secure As Practical
- ASAP
- ASD
- ASD 8
- ASD essential 8
- Attack surface reduction
- Australian cyber security centre
- Azure Active Directory
- Azure Application Proxy
- Bombs
- Breach
- Business Email Compromise
- CASB
- CIS 18
- CISA
- CISA Scuba
- Client Access Security Broker
- Cyber risk
- Cyber Security Framework
- Data Loss Prevention
- Data Protection
- Defender for O365
- DLP
- DMARC
- Do something
- Endpoint Detection Response
- EndPoint Protection
- EPP
- Exam prep
- Extended detection and response
- Extended Detection Response
- Funny
- GDAP
- Hiring
- Identity Access Management
- Incident response
- Industry
- Information Protection
- JGES
- Just good enough security
- Least privilege
- M365
- Machine Learning
- Macro
- Malware
- Managed Detection Response
- MDR
- MFA
- Microsoft
- Microsoft Autopatch
- Microsoft Azure Active Directory
- Microsoft certification
- Microsoft Defender
- Microsoft Defender Application Guard
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint Server
- Microsoft Defender for Identity
- Microsoft Defender Vulnerability Management
- Microsoft Endpoint Manager
- Microsoft Intune
- Microsoft licensing
- Microsoft purview
- Microsoft Sentinel
- Mitre Att&ck
- ML
- MSP
- Multi factor Authentication
- multifactor authentication
- MVCS
- Network detection and response
- NIST CSF
- Office Macro
- Open source
- Operating System Hardening
- Opinion
- PAM
- people
- Phishing
- Planning
- Privileged Access Management
- Process
- Protection
- Purview Information Protection
- Ransomeware
- Ransomware
- Sandbox
- SASE
- SCUBA
- Secure Access Service Edge
- Security Assessment
- Security information event management
- Security posture
- SIEM
- Single Sign On
- Software Industry
- SSO
- Supplier Breach
- Threat and vulnerability management
- Threat Hunting
- Windows 10
- Windows Autopilot
- Windows Sandbox
- WTH
- XDR
- Zero day
- Zero Trust Network Architecture
- ZTNA
Recent Posts
- Microsoft Office Macro security – Are you covered?
- AI devices currently, nothing but “hot Air”
- SCUBA now scans Google
- Data Cleansing and Large Language Models
- Consulting Integrity
Recent Comments
Tags
#acsc #asd8 #kicksecio 101 AI Airlock digital Application Control Apps for Business Artificial Intelligence ASD 8 Breach Broadcom Business Email Compromise CISA SCUBA Cyber Security Data leakage Data leakage prevention Data Loss Prevention Data Protection DLP Endpoint Detection response Extended Detection Response Hiring Managed Detection Response Managed Service Provider MDR MFA Microsoft Microsoft Defender for cloud Microsoft Defender for endpoints Microsoft Defender Vulnerability Management Microsoft Sentinel Multi factor authentication Office macro security okta PAM Privileged Access Management Purview Purview information Protection Security Posture Sentinel SIEM Single Sign On SSO Vmware