SIEM – Security Information & event management
Read More: SIEM – Security Information & event managementSIEM – Security Information & event Management platforms are mature cyber security solutions, often having come from a legacy of application log gathering with the data being used for availability and performance as well as access management, it has been a simple and logical transition into security log gathering and analysis of that data for…
EDR, XDR – NDR
Read More: EDR, XDR – NDRWith the uptake of Cyber Security solutions by clients globally it was only a matter of time for EDR tools to be mainstream for customers as it is today in 2022. NDR is also starting to make progress towards mainstream adoption in 2021 as detailed in the below image.
Conditional Access
Read More: Conditional AccessConditional Access is a Microsoft technology focused on making businesses more secure.
99.9% reduction in risk from cyber attack, the best ROI available in cyber
Read More: 99.9% reduction in risk from cyber attack, the best ROI available in cyberMulti Factor Authentication or MFA for short, is an additional security measure (Factor) added after an authentication attempt has occurred to ensure that the “entity” who entered the user name and the password is in fact the entity that should know the user name and the password.
Go Passwordless!
Read More: Go Passwordless!Implementing the right MFA solution will provide additional security to your business / organisation while actually improving your security as well.
PASS – Mandatory 25 NSW Government report
Read More: PASS – Mandatory 25 NSW Government reportPASS – Mandatory 25 NSW Government report. Mandatory 25 NSW Government requirements: Personally as an Australian by choice so proud to find out that the government of Australia is creating material like the “‘Mandatory 25’ Requirements for Cyber Security”, proving that Australia is taking cyber security seriously across government at all levels. I have attached…
MS 900 – Microsoft 365 Fundamentals
Read More: MS 900 – Microsoft 365 FundamentalsStarting with a new company called rhipe has required me to go and certify in the various Microsoft security solutions portfolio. Rather than provide a lot of detail on how to pass the exam I wanted to collect together the information that I used so that you can find the details yourself and use these…
“Statisticising” cyber security
Read More: “Statisticising” cyber securityLast night I went fishing in our new boat and we caught 2 Dusky Flatheads, ugly but a great eating fish, sorry I digress but it seemed important at the time, here they are – we had no time to name them: Sorry I got distracted – a challenge with the modern day, living in…
Zero trust Network Architecture, layers!
Read More: Zero trust Network Architecture, layers!medieval parlance. Unfortunately without adaquate planning and architecture just like castles, ZTNA “Stacks” fall over and sink into the ground.
Supply Chain Attacks
Read More: Supply Chain AttacksSupply chain attacks can be a very serious issue, instead of one hacker to one client, the issue becomes one hacker to many hundreds of client businesses being affected. Many/most staff use the same password for work related services (Kronos) as they do for their corporate work accounts. Therefore each Kronos customer must be forcing…