Artificial Intelligence?
Read More: Artificial Intelligence?Artificial Intelligence is not always Artificial Intelligence, every Cyber Security vendor selling solutions today is either putting an “using AI” sticker on their website, or they are investigating how they can use Artificial Intelligence “AI” and Machine Learning “ML”in their branding. It stands to reason as the terms are well on the incline of the…
Help! choose a vendor
Read More: Help! choose a vendorIn the Cyber Security industry there are no sure bets, large companies have revenue and legacy products to protect, which stifles innovation.
Insecure – MicroSoft Autodiscover
Read More: Insecure – MicroSoft AutodiscoverMicrosoft Exchange servers autodiscover function, configured by the wrong hands, is not secure! A systems administrator who incorrectly sets up their on-premise Autodiscover record could be assisting miscreants to slurp up credentials from an organisations users trying to connect to their corporate email account.
The cost of SSO?
Read More: The cost of SSO?A friend of mine recently posted this interesting article on adding Single Sign On for various vendor products (thank you Charles) and I wanted to share, primarily because it gives an insight into the ways that some vendors are gouging their customers for functionality that has a negligible cost for the vendor and in some…
End Point Protection (epp)
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธ
Read More: End Point Protection (epp)Organisation type: All organisations need End Point Protection
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธ
Data Incontinence – when leaks sneak out
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธโญ๏ธ
Read More: Data Incontinence – when leaks sneak outTo prevent data being used against you in the future either through competitive, intellectual or malicious usage or publication? What should you do?
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธโญ๏ธ
Managed Detection and Response (mdr)
CSF framework: 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธ
Read More: Managed Detection and Response (mdr)Detection and Response or the may be eXtended Detection and Response, this depends on the Solution provider of MDR. Newer solutions exist now termed as Advanced Managed Detection and Response which is a merging of MDR along with additional capabilities to provide advanced Detection and Response capabilities.
CSF framework: 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธ
Advanced Managed Detect Response (AMDR)
CSF framework: 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธ
Read More: Advanced Managed Detect Response (AMDR)MDR stands for is the next generation of cyber security Detect and Response solutions in the market to target breaches and other malicious activity, eXtended Detection and Response XDR stood for an extended range of detection capability (Network and other devices/ sources of data) and AMDR will take over where XDR lets go.
CSF framework: 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธ