#1, Down and Dusty with Microsoft sentinel
Read More: #1, Down and Dusty with Microsoft sentinel#1, down and Dusty with Microsoft Sentinel. Sentinel is one of Microsofts Crown Jewels hidden so well in plain sight that many Managed Service Providers and cyber security teams do not even know it can help them significantly with investigating Indicators of Compromise or investigating a cyber attack to find the source and the target.…
The No.1 way to protect Data, Defender for Business and Premium
Read More: The No.1 way to protect Data, Defender for Business and PremiumThe No.1 way to protect Data, Defender for Business and Premium, MSP’s and businesses looking for better coverage of the ASD Essential 8 with the fewest possible products should look at Microsoft Defender for Business or Business Premium preferably. This morning a colleague (thanks Ross) sent me this article and it reminded me that we…
Threat Hunters, Hard job, tough to find too!
Read More: Threat Hunters, Hard job, tough to find too!Threat Hunters, Hard job, tough to find too! – the following article has been kindly shared with permission by GravityWall.net from an original article written on their website here. Employing good cyber security candidates is hard So many considerations: technical vs team fit vs ability to learn etc etc, I recently came across this very…
Easy Fail – Australian critical infrastructure
Read More: Easy Fail – Australian critical infrastructureThe Easy Fail in critical infrastructure should have all of us worried right now, whether it is the water being turned off, the traffic lighting systems that we all rely on to get around the cities we live in or much worse, the Electricity that we used to power our homes and provide us warmth…
Cyber Attack Vectors 2022; where marketing and reality diverge
Read More: Cyber Attack Vectors 2022; where marketing and reality divergeCyber Attack Vectors 2022; where marketing and reality diverge. The Identity Theft resource centre ‘Q1 2022 Data Breach Analysis’ report is an interesting 2022 report with a not surprising result to many cyber security professionals. Human Error is the number One source of cyber breach The number one attack vector “Cyber attack” is in-fact Human…
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Read More: An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack VectorsAn Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. Recently I wrote about EDR failure to detect and respond to cases of Advanced Persistent Threats here after discovering a research paper on the topic when researching the use of Machine Learning in cyber security Detection and response solutions such…
Go Passwordless!
Read More: Go Passwordless!Implementing the right MFA solution will provide additional security to your business / organisation while actually improving your security as well.
PASS – Mandatory 25 NSW Government report
Read More: PASS – Mandatory 25 NSW Government reportPASS – Mandatory 25 NSW Government report. Mandatory 25 NSW Government requirements: Personally as an Australian by choice so proud to find out that the government of Australia is creating material like the “‘Mandatory 25’ Requirements for Cyber Security”, proving that Australia is taking cyber security seriously across government at all levels. I have attached…
CS Energy Breach
Read More: CS Energy BreachCS Energy in Queensland, Australia recently made the headlines when a breach was detected and thwarted before any harm was done to their customers. I want to congratulate the response from CS Energy’s cyber security team, they clearly detected and responded to a potentially catastrophic situation in a controlled and timely manner, great work! This…
55% of kiwi businesses fall “victim”
Read More: 55% of kiwi businesses fall “victim”I still hate statistics especially when those stats point to something that is so blatantly “not true”! 55% of kiwi businesses fell “victim” to a ransomware attack? How about a more accurate statistic (sorry), 100% of Kiwi businesses received a ransomware loaded email…. even one ransomware loaded email per day! both are pointless and yet…