Identity and Access Management (iam)
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธ
Read More: Identity and Access Management (iam)Of the many technologies available to organisations today, Identity Access Management or IAM is arguably one of the most mature of all. Legacy companies such as IBM, CA, Oracle, Microsoft and newer innovators such as SailPoint have been providing Identity and Access Management solutions for several years and this market is mature and the problem…
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธ
Multi Factor Authentication
CSF framework: 2. Protect. Cyber Maturity Level:โญ๏ธ
Read More: Multi Factor AuthenticationIf your organisation does not use Multi Factor Authentication yet, then Read on and before you do anything else. Next ensure you get Multifactor authentication implemented ASAP for the sake of your job and your business. The Problem Passwords are not secure in isolation, they need to be remembered and they need to be changed…
CSF framework: 2. Protect. Cyber Maturity Level:โญ๏ธ
Does size matter – mdr vendors
Read More: Does size matter – mdr vendorsWhen selecting a vendor for your Managed Detection and Response (MDR) requirements, what are the most critical considerations? Personally I had always considered that the size of the organisation providing my MDR needs was a strong point in favour of vendors like CrowdStrike, SentinelOne, Rapid7, FireEye etc etc…… Once upon a time there was also…
Privileged Access Management (PAM)
CSF framework: 1. Identify; 2. Protect; 3. Detect. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธโญ๏ธ
Read More: Privileged Access Management (PAM)This is what PAM solves; the admin account problem – as all account passwords need to be managed how do you do this, the administrative accounts issue is where PAM is your answer.
CSF framework: 1. Identify; 2. Protect; 3. Detect. Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธโญ๏ธ
Entry level hiring?
Read More: Entry level hiring?Cyber security has a big problem at the moment in relation to hiring good staff for the roles that are available. Often times we also hear that many candidates are being overlooked and can not find roles in this field. Recently I came across this post on Reddit from a manager who is/was hiring for…
era is over – inventor of the ZX spectrum gone
Read More: era is over – inventor of the ZX spectrum goneSir Clive Sinclair has died on the 16/09/2021, Sir Clive created many innovative products over his lifetime including Calculators, Electric Vehicles, Micro TV’s etc and while I only used his computers briefly, it very sad to see him gone, another pioneer has moved on from this world. As I grew up in the 1970s and…
Anonymous?
Read More: Anonymous?Anonymising data is not anonymous data, nowadays many data providers are claiming that our data will be used anonymously by removing uniquely identifiable markers from the details they collect from us. Unfortunately to de-anonymise data all that is needed is pointers that make you unique, take for example your GPS data which shows you travel…
How to: Thwarting ransomware according to Cert NZ
Read More: How to: Thwarting ransomware according to Cert NZRansomware at its most basic prevents a user or an organisation from accessing their data.
Artificial Intelligence – Managed Detection and Response
Read More: Artificial Intelligence – Managed Detection and ResponseTwo buzzwords applied to almost all Cyber Security companies products today are: Artificial Intelligence and Machine Learning or AI and ML. What exactly the AI or ML technology in these solutions and managed service offerings we consume are providing, is open to debate; as is the depth of implementation and integration. However there are great…