EDR, XDR – NDR
Read More: EDR, XDR – NDRWith the uptake of Cyber Security solutions by clients globally it was only a matter of time for EDR tools to be mainstream for customers as it is today in 2022. NDR is also starting to make progress towards mainstream adoption in 2021 as detailed in the below image.
Conditional Access
Read More: Conditional AccessConditional Access is a Microsoft technology focused on making businesses more secure.
99.9% reduction in risk from cyber attack, the best ROI available in cyber
Read More: 99.9% reduction in risk from cyber attack, the best ROI available in cyberMulti Factor Authentication or MFA for short, is an additional security measure (Factor) added after an authentication attempt has occurred to ensure that the “entity” who entered the user name and the password is in fact the entity that should know the user name and the password.
Go Passwordless!
Read More: Go Passwordless!Implementing the right MFA solution will provide additional security to your business / organisation while actually improving your security as well.
PASS – Mandatory 25 NSW Government report
Read More: PASS – Mandatory 25 NSW Government reportPASS – Mandatory 25 NSW Government report. Mandatory 25 NSW Government requirements: Personally as an Australian by choice so proud to find out that the government of Australia is creating material like the “‘Mandatory 25’ Requirements for Cyber Security”, proving that Australia is taking cyber security seriously across government at all levels. I have attached…
MS 900 – Microsoft 365 Fundamentals
Read More: MS 900 – Microsoft 365 FundamentalsStarting with a new company called rhipe has required me to go and certify in the various Microsoft security solutions portfolio. Rather than provide a lot of detail on how to pass the exam I wanted to collect together the information that I used so that you can find the details yourself and use these…
“Statisticising” cyber security
Read More: “Statisticising” cyber securityLast night I went fishing in our new boat and we caught 2 Dusky Flatheads, ugly but a great eating fish, sorry I digress but it seemed important at the time, here they are – we had no time to name them: Sorry I got distracted – a challenge with the modern day, living in…
Zero trust Network Architecture, layers!
Read More: Zero trust Network Architecture, layers!medieval parlance. Unfortunately without adaquate planning and architecture just like castles, ZTNA “Stacks” fall over and sink into the ground.
Supply Chain Attacks
Read More: Supply Chain AttacksSupply chain attacks can be a very serious issue, instead of one hacker to one client, the issue becomes one hacker to many hundreds of client businesses being affected. Many/most staff use the same password for work related services (Kronos) as they do for their corporate work accounts. Therefore each Kronos customer must be forcing…
The best hackers are Russian!
Read More: The best hackers are Russian!This story is in no way disrespectful to Russians, it is a tribute to one of the Russians I have had the pleasure of working with in my past. Several years ago in prior to my career change into vendor land, I used to be a team leader for a Server team in a large…