Browse our Cybersecurity technical articles here. We’re sharing our knowledge with fellow cybersecurity practitioners in the hope that we can all progress further and faster in protecting our information systems.

AGIX Discussion CISM, CRISC & CDPSE Cybersecurity

The Log Life-Cycle In Todays Complex Environments

The risks associated with mismanaged logs is measured in financial costs, penalties for non-compliance, lost opportunities, and missed discovery of indicators of compromise that would otherwise have been detected. This article discusses the log life-cycle trend in todays complex computing environments. The log generators (the source system) we’d consider part

Read more
AGIX Discussion AI & LLM All HowTo's CISM, CRISC & CDPSE Cybersecurity

Replacing Macros with AI in the Essential 8

It’s a matter of time before artificial intelligence (AI) is included as a domain in the Essential 8. But first, some background. The Essential 8 is the Australian Cyber Security Centre’s (ACSC) advisory/guide for Australian organisations to follow (sometimes a requirement, others just a recommendation) to best protect their systems.

Read more
AGIX Discussion All HowTo's CISM, CRISC & CDPSE Cybersecurity

Blocking the Source or the Target – Attack Response Best Practices

This article discusses best practices for where to block an attack… the source or destination? Firewall administrators are taught to block nearest the source. System administrators are taught to block nearest the target. Let’s discuss this. Firewall administrators sensibly want to block an attack nearest the attacker. This limits the

Read more
All HowTo's Cybersecurity Ubuntu, Mint & Debian Linux Web Servers

Apache Example Configuration for GeoIP Fencing, SSL/TLS Termination, and Reverse Proxy

This article shows an example configuration that will achieve three objectives: Provide GeoIP Fending, Provide SSL/TLS Termination, and server as a Reverse Proxy. In this example we’re using Ubuntu 22.04. Connections coming in on HTTP (port 80) are redirected to HTTPS (port 443) which is where the GeoIP Fencing takes

Read more
All HowTo's Cybersecurity Linux Ubuntu, Mint & Debian Linux

Installing Graylog Open on Ubuntu 22.04

This article is a walkthrough for installing “Graylog Open 6” and leverages the documentation at “https://go2docs.graylog.org/current/downloading_and_installing_graylog/ubuntu_installation.html” and “https://www.mongodb.com/docs/manual/tutorial/install-mongodb-on-ubuntu/”. We’re using Ubuntu 22.04 because 24.04 is not supported using the documentation linked above. We’re starting from a fresh “standard” Ubuntu 22.04 installation. Our resources are “4GB RAM, 8 CPU Cores, 25GB

Read more