Recent Posts:

Customer-Managed Keys: Navigating the Risks and Responsibilities

Customer managed keys (CMK) are something that is considered by most. If you aim to follow any framework, or benchmarking often you will see this listed as a must! In most cases, however, this isnā€™t true. Before you move to CMK, you need to have done the groundwork, and have a clear understanding of theā€¦

Keep reading

Secure Your DevOps Pipeline with These Essential Practices

Many are running some form of DevOps, however, not all are ā€œdoing the basicsā€ when it comes to security. Sure, it functions, but can something catch you out later down the line? Below are some of the main principles that organizations should be running, if DevOps is adopted. Getting The BasicsĀ Done 1. Build a security-focusedā€¦

Keep reading

Enhance Your Cybersecurity Posture: Donā€™t Just Log

Defining a logging strategy can be hard. Itā€™s unclear what logs you will need during a Cyber Security incidents, or outage. The notion of not having logs during hard times brings fear, so often a strategy of ā€œlog the lotā€ starts to develop. Why Is That A BadĀ Thing? The idea of logging all brings ilusions.ā€¦

Keep reading

DeeFang Your URLs! šŸ©ø

Introducing DeeFang, a browser extension to help defang urls. Previously, I create https://irlinks.co for this purpose and added additional features, however it looks like DeeFang may be the new path forward. šŸš€ ā€œDeeFang is a streamlined Chrome extension designed for easy URL defanging. With a single click, transform URLs to a safer format by replacingā€¦

Keep reading

Host A Free Website With Azure and GitHub

šŸ”„Not a member? Find my posts and more on X (Twitter šŸ¤)ā€” Follow me ā— Hosting sites may only cost the same as a Starbies ā˜•but it still isnā€™t free. With Azure and GitHub, you can run a site for free and the only cost is the time-to-learn (TTL). With this run-through, Iā€™ll get youā€¦

Keep reading

5 Reasons Why Learning PowerShell Is a Good Thing for Your Career

šŸ”„Not a member? Find my posts and more on X (Twitter šŸ¤)ā€Šā€”ā€ŠFollow me ā— āœ…The ShortĀ Answer PowerShell is a powerful scripting language that can be used to automate tasks on Windows systems. It is becoming increasingly popular in the IT industry, and knowing how to use it can give you a significant advantage in yourā€¦

Keep reading

5 New AI Websites That You Need to Know About in 2023

šŸ”„Not a member? Find my posts and more on X (Twitter šŸ¤)ā€Šā€”ā€ŠFollow me ā— In recent years, artificial intelligence (AI) has become increasingly sophisticated and accessible. This has led to the development of a number of new AI websites that offer a variety of useful and innovative services. In this blog post, we will takeā€¦

Keep reading

How to Maximize Data Security in Databricks with Unity Catalog

šŸ”„Not a member? Find my posts and more on X (Twitter šŸ¤)ā€Šā€”ā€ŠFollow me ā— Azure Databricks provides a variety of security features to ensure the safety and privacy of data stored in the platform. Databricks offers network isolation, which keeps the data and resources secure from unauthorized access. Users can also take advantage of Azureā€¦

Keep reading

Prevent CrowdStrike RFM With Tanium!

šŸ”„Not a member? Find my posts and more on X (Twitter šŸ¤)ā€Šā€”ā€ŠFollow me ā— RFM in CrowdStrike is a big frustration for most. You have this awesome product to help defend however if your admins patch to quickly and itā€™s not supported, it loses itā€™s wings. That sentence right there is a very confusing conundrum!ā€¦

Keep reading

How To Mass Unfollow On Twitterā€Šā€” For Free

If youā€™re wanting to reduce your following count and donā€™t trust all those Chrome extensions and scripts, see below. There seems to be a limit per day which varies between accounts, however run and see. Mr Musk and team have also thought of many ways to prevent this, so it took some time to figureā€¦

Keep reading

Azure OpenAI Security: What You Need to Know

Microsoft šŸ”„Not a member? Find my posts and more on X (Twitter šŸ¤)ā€Šā€”ā€ŠFollow me ā— You may have seen in the news that many companies are starting to limit and control how their employees use OpenAI. The main reason is privacy and data security concerns.šŸ‘ā€šŸ—Ø Whilst many will halter usage and wait for governance toā€¦

Keep reading

Stay Ahead of the Game: The Importance of Threat Modeling in Cybersecurity

Photo by Patrick Hendry onĀ Unsplash Threat modelling is a systematic process of identifying and analyzing potential threats and vulnerabilities in a system or application to determine the most effective way to protect it from attacks. In the context of cyber security, threat modelling involves identifying potential attack vectors and determining the likelihood and impact ofā€¦

Keep reading

The Basics of Cloud Security

Photo by Growtika onĀ Unsplash Data Protection and Privacy Data protection and privacy are a fundamental part of any digital system or process. It involves the collection, storage, access, and use of personal or sensitive information, and the safeguarding of that data to maintain its security and confidentiality. This is done by following security protocols andā€¦

Keep reading

The Security Incident Reponse Playbook

The basics Security incident response plans are critical for organizations of all sizes to have in place. These plans outline the steps that should be taken in the event of a security breach or other cyber incident, and help to ensure that the organization is able to respond quickly and effectively to minimize the damageā€¦

Keep reading

Loading…

Something went wrong. Please refresh the page and/or try again.

Design a site like this with WordPress.com
Get started