AGIX Discussion All HowTo's CISM, CRISC & CDPSE Cybersecurity

Blocking the Source or the Target – Attack Response Best Practices

This article discusses best practices for where to block an attack… the source or destination? Firewall administrators are taught to block nearest the source. System administrators are taught to block nearest the target. Let’s discuss this. Firewall administrators sensibly want to block an attack nearest the attacker. This limits the

Read more
AGIX Discussion AI & LLM All HowTo's CISM, CRISC & CDPSE Cybersecurity

Replacing Macros with AI in the Essential 8

It’s a matter of time before artificial intelligence (AI) is included as a domain in the Essential 8. But first, some background. The Essential 8 is the Australian Cyber Security Centre’s (ACSC) advisory/guide for Australian organisations to follow (sometimes a requirement, others just a recommendation) to best protect their systems.

Read more
AGIX Discussion All HowTo's CISM, CRISC & CDPSE

Protecting your SIEM, Virtual Infrastructure, and Backups

This article discussed key vital infrastructure components, the threats they face, and the measures that can be taken to remediate the risk. The three components are: SIEM, Virtual Infrastructure, and Backups. All three are targets for Hackers and Ransomware. Consider the scenario where an administrative domain account has been compromised

Read more