This article discussed key vital infrastructure components, the threats they face, and the measures that can be taken to remediate the risk. The three components are: SIEM, Virtual Infrastructure, and Backups. All three are targets for Hackers and Ransomware. Consider the scenario where an administrative domain account has been compromised
Read moreThe Case Against Threat Intelligence in Business
Threat intelligence as a function of a regular business returns little to no value to the organisation. The skill-sets could be better used for threat hunting and analysis which are proactive approaches to cybersecurity and have a direct positive impact to the business. I should clarify that threat intelligence in
Read moreA SIEM as a Process
This article explores the concept of a SIEM as part of a process, and without a process, you don’t have a SIEM. A SIEM is a security information and event management system. In it’s full capacity, it accepts logs from a variety of sources and via a variety of protocols,
Read more