AGIX Discussion CISM, CRISC & CDPSE Cybersecurity

The Log Life-Cycle In Todays Complex Environments

The risks associated with mismanaged logs is measured in financial costs, penalties for non-compliance, lost opportunities, and missed discovery of indicators of compromise that would otherwise have been detected. This article discusses the log life-cycle trend in todays complex computing environments. The log generators (the source system) we’d consider part

Read more
AGIX Discussion All HowTo's CISM, CRISC & CDPSE Cybersecurity

Blocking the Source or the Target – Attack Response Best Practices

This article discusses best practices for where to block an attack… the source or destination? Firewall administrators are taught to block nearest the source. System administrators are taught to block nearest the target. Let’s discuss this. Firewall administrators sensibly want to block an attack nearest the attacker. This limits the

Read more
AGIX Discussion AI & LLM All HowTo's CISM, CRISC & CDPSE Cybersecurity

Replacing Macros with AI in the Essential 8

It’s a matter of time before artificial intelligence (AI) is included as a domain in the Essential 8. But first, some background. The Essential 8 is the Australian Cyber Security Centre’s (ACSC) advisory/guide for Australian organisations to follow (sometimes a requirement, others just a recommendation) to best protect their systems.

Read more
AGIX Discussion All HowTo's CISM, CRISC & CDPSE

Protecting your SIEM, Virtual Infrastructure, and Backups

This article discussed key vital infrastructure components, the threats they face, and the measures that can be taken to remediate the risk. The three components are: SIEM, Virtual Infrastructure, and Backups. All three are targets for Hackers and Ransomware. Consider the scenario where an administrative domain account has been compromised

Read more