Steel Cyber Security

Welcome to my
Cyber Security Blog

COVID-19.

In light of the current pandemic outbreak of Coronavirus, code-name “COVID-19”, I’ve put together some key pointers, as well as things you can do to protect you, your colleagues and your families – especially with the recent news and advice of working from home. I think it goes without saying this is from a Cyber…

The Vulnerability Management Problem

I think it goes without saying that there is a problem when it comes to vulnerability management. Period. From a recent event there was a simple question asked amongst a group of Information Security professionals, most had never met or spoken before. We are all from different companies, parts of the country, different countries and…

Stay Safe Online.. Personal and Professional

Though there are many sources out there with regards to staying safe online, and best practices and so on but primarily only tell you how to do this in your personal setting. So, I have put together a few from my own thoughts of the ones that I feel are most important and impacting, and…

Turning Isolation and Silos into Collaboration

I am a firm believer that the most common perceptions towards the Cyber Security industry is that those who work in the industry are both isolated and introverted while showing no signs of ineptitude. While being both a compliment and an insult, it is still a common perception that I’ve come across from my time…

React & Respond vs Proactive & Preventative

Just a quick side note, if you’re struggling with any acronyms or understanding of phrases, my Jargon Buster should help, but if not please do reach out to me. As a follow on from the post around the purpose of a SOC, here, I want to discuss a bit more around the react and respond…

The SOC Acquisition

Discussing the purpose of a Security Operations Center (SOC) from a personal thought standpoint. No other references were used for this, it is all opinion based. I attempt to cover what I believe to be the purpose of a SOC, what the analysts do, the pros and cons to the job, brief comparisons to internal…

Jargon Buster

An A-Z repository of Cyber Security Terminology. Anti-Virus SoftwareA computer program used to prevent, detect, and remove malware. BackdoorA “hidden” method of bypassing security to gain access to a restricted part of a computer system. BAUThe normal execution of operations within an organisation. BotnetA collection of internet-connected devices, which may include PCs, servers and mobile…

Introduction to Steel-Cyber & The Blog

This is the start of my blogging on Steel-Cyber! The Cyber space has a lot going on, but from my experience it lacks the “basic” stuff that people are expected to know; but if that’s the case, how are you ever going to learn it? That is what I want to iron out. And so,…


Subscribe and Follow My Blog

Get new content delivered directly to your inbox.