In light of the current pandemic outbreak of Coronavirus, code-name “COVID-19”, I’ve put together some key pointers, as well as things you can do to protect you, your colleagues and your families – especially with the recent news and advice of working from home. I think it goes without saying this is from a CyberContinue reading “COVID-19.”
Category Archives: Uncategorized
The Vulnerability Management Problem
I think it goes without saying that there is a problem when it comes to vulnerability management. Period. From a recent event there was a simple question asked amongst a group of Information Security professionals, most had never met or spoken before. We are all from different companies, parts of the country, different countries andContinue reading “The Vulnerability Management Problem”
Stay Safe Online.. Personal and Professional
Though there are many sources out there with regards to staying safe online, and best practices and so on but primarily only tell you how to do this in your personal setting. So, I have put together a few from my own thoughts of the ones that I feel are most important and impacting, andContinue reading “Stay Safe Online.. Personal and Professional”
Turning Isolation and Silos into Collaboration
I am a firm believer that the most common perceptions towards the Cyber Security industry is that those who work in the industry are both isolated and introverted while showing no signs of ineptitude. While being both a compliment and an insult, it is still a common perception that I’ve come across from my timeContinue reading “Turning Isolation and Silos into Collaboration”
React & Respond vs Proactive & Preventative
Just a quick side note, if you’re struggling with any acronyms or understanding of phrases, my Jargon Buster should help, but if not please do reach out to me. As a follow on from the post around the purpose of a SOC, here, I want to discuss a bit more around the react and respondContinue reading “React & Respond vs Proactive & Preventative”
The SOC Acquisition
Discussing the purpose of a Security Operations Center (SOC) from a personal thought standpoint. No other references were used for this, it is all opinion based. I attempt to cover what I believe to be the purpose of a SOC, what the analysts do, the pros and cons to the job, brief comparisons to internalContinue reading “The SOC Acquisition”
Jargon Buster
An A-Z repository of Cyber Security Terminology. Anti-Virus SoftwareA computer program used to prevent, detect, and remove malware. BackdoorA “hidden” method of bypassing security to gain access to a restricted part of a computer system. BAUThe normal execution of operations within an organisation. BotnetA collection of internet-connected devices, which may include PCs, servers and mobileContinue reading “Jargon Buster”
Introduction to Steel-Cyber & The Blog
This is the start of my blogging on Steel-Cyber! The Cyber space has a lot going on, but from my experience it lacks the “basic” stuff that people are expected to know; but if that’s the case, how are you ever going to learn it? That is what I want to iron out. And so, I will address this.