- Articles, ASD, ASD 8, ASD essential 8, Australian cyber security centre, Privileged Access Management, WTH
Privilege access Management
Read MorePrivileged Access Management, cyber attacks often still operate primarily on the premise that a logged in user has privileged access to their workstation or Laptop, this aspect has never changed despite platform providers ‘improving’ their security models over time.
Michael Brooke
Recent Posts
- 101: Basic Security Posture for WordPress
- 101: Introducing Microsoft Defender for Endpoint
- MSP’s Enable GDAP or lose access to your O365 customers
- Microsoft Sentinel – reducing spend and log complexity first
- Secure Cloud Business Applications – assess your security
About me
Michael Brooke is a passionate cyber security enthusiast, my goal is to ensure organisations are As Secure As Practical (ASAP) As Soon As Possible. To this end I consult on the Microsoft security stack primarily with a goal to enable and educate clients and partner organisations to do the best they can with the tools they have currently.
My frameworks of choice are the Australian Signals directorate Essential 8 and Zero Trust Network Architecture , the ASD8 being more prescriptive and ZTNA being much less prescriptive and more iterative.
I am a Microsoft Cyber security Expert by certification and am still learning every single day.
I refer to myself as a cyber security enthusiast and there is so much that I am yet to learn.
Tags
#acsc (2) #asd8 (2) #kicksecio (10) 101 (3) Artificial Intelligence (2) ASD 8 (2) Breach (8) Cyber Security (28) Data leakage (3) Data Loss Prevention (2) Data Protection (4) DLP (2) Endpoint Detection response (3) Extended Detection Response (3) Hiring (2) Managed Detection Response (6) Managed Service Provider (4) MDR (2) Microsoft (15) Microsoft Defender for cloud (2) Microsoft Defender for endpoints (7) Microsoft Sentinel (2) okta (2) PAM (2) Privileged Access Management (2) Sentinel (2) SIEM (3) Single Sign On (2) SSO (2)
Recent Comments
Archive
- January 2023
- December 2022
- November 2022
- October 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2020
- April 2018
Categories
- ACSC
- ACSC essential 8
- Advanced Managed Detect Response
- AI
- Airlock Digital
- AMDR
- Application Control
- Articles
- Artificial Intelligence
- As Secure As Practical
- ASAP
- ASD
- ASD 8
- ASD essential 8
- Australian cyber security centre
- Azure Active Directory
- Azure Application Proxy
- Bombs
- Breach
- Business Email Compromise
- CASB
- CIS 18
- CISA
- CISA Scuba
- Client Access Security Broker
- Cyber risk
- Cyber Security Framework
- Data Loss Prevention
- Data Protection
- Defender for O365
- DLP
- DMARC
- Do something
- Endpoint Detection Response
- EndPoint Protection
- EPP
- Exam prep
- Extended detection and response
- Extended Detection Response
- Funny
- GDAP
- Hiring
- Identity Access Management
- Incident response
- Information Protection
- JGES
- Just good enough security
- Least privilege
- M365
- Machine Learning
- Malware
- Managed Detection Response
- MDR
- MFA
- Microsoft
- Microsoft Autopatch
- Microsoft Azure Active Directory
- Microsoft certification
- Microsoft Defender
- Microsoft Defender Application Guard
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint Server
- Microsoft Defender for Identity
- Microsoft Defender Vulnerability Management
- Microsoft Endpoint Manager
- Microsoft Intune
- Microsoft licensing
- Microsoft purview
- Microsoft Sentinel
- Mitre Att&ck
- ML
- MSP
- Multi factor Authentication
- multifactor authentication
- MVCS
- Network detection and response
- NIST CSF
- Open source
- Operating System Hardening
- PAM
- people
- Phishing
- Planning
- Privileged Access Management
- Process
- Protection
- Purview Information Protection
- Ransomeware
- Ransomware
- Sandbox
- SASE
- SCUBA
- Secure Access Service Edge
- Security Assessment
- Security information event management
- Security posture
- SIEM
- Single Sign On
- SSO
- Threat and vulnerability management
- Threat Hunting
- Windows 10
- Windows Autopilot
- Windows Sandbox
- WTH
- XDR
- Zero day
- Zero Trust Network Architecture
- ZTNA