10 years ago, when Gartner defined SIEM (Security Information and Event Management) it was trending in the cybersecurity landscape, and every organization was looking for one. More players started coming… Read more Breach and Attack Simulation – BAS Products Compared →
Australia Signal Directorate (ASD) and Australia Cyber Security Centre (ACSC) has defined a strategy called Essential Eight to help organizations mitigate threats and adversaries. These eight strategies are baselines and… Read more How to protect your organization using Essential Eight mitigation strategy? →
Active directory in Windows have some built in features to set restriction for passwords created in your environment. How cool would it be if we can compare the passwords used… Read more Active Directory Password Audit – Using Pwned Passwords →
Every time when you sign up to a new service online, you would have to create a password. As a security measure, every site will ask you to create a… Read more Password hygiene. How to create strong passwords and manage them? →
When you download software from trusted sources like Microsoft or Google you don’t have to worry much about trustworthiness. But when you download software or any files from random sites or programs sent by friends, how do you verify them? When we download file or software from unknown sites, we can scan it with our Antivirus(AV) software to check if it is safe to use or a malicious one. What if the actual file is malicious and your AV is not aware of it? Yes, it is possible. It could… Read more Installing unknown software? Read this before you proceed. →
Ransomware attacks is on all-time high. Every week or month there is a new variant coming out. Cisco says that Ransomware attacks are growing more than 350 percent annually. If… Read more How to secure your pc from Ransomware? →