-
Demystifying SASE: 5 Ways it helps with Zero Trust initiatives
Secure access service edge or – to begin with is not a product. Its an architectural model. With more organizations moving to remote work, adopting cloud services, and embracing digital transformation, traditional security models are becoming outdated. That’s where Secure Access Service Edge, or SASE, comes in. You may have heard the term being thrown…
-
Exploring the ASD Essential 8
Over the last couple of years working with Australian customers and partners have given me the chance to evaluate and understand the ASD Essential 8 controls in Australia. The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various…
-
Personal VPN – Should you or Shouldn’t you??
A VPN, or Virtual Private Network, is a cybersecurity tool that reroutes your internet traffic through an encrypted tunnel, allowing you to: ImgSrc: privateinternetaccess.com Virtual Private Networks (VPNs) have long been used to hide the origin IP address for privacy reasons, or to access geo-restricted services, or to surf the internet securely on public wifi…
-
Authn vs Authz
In information security, authentication (abbreviated as authn) and authorization (authz) are related but separate concepts. Both are an important part of identity and access management (IAM). How are authn and authz different? Authn – Authentication means making sure that a person or device is who (or what) they claim to be Authz – Authorization determines what…
-
The Value of Time in Cybersecurity
If you are reading this, firstly Happy Holidays. In this post I will explore my learnings from my 2 years at Tanium. I often get asked why am I at Tanium am this long. Simply put I believe in the mission and the outcomes Tanium is looking to and is delivering to customers each day.…
-
Web Isolation – Internet Separation Simplicity
In a previous blog post, I explored how a simple DNS change can keep you safe when at home. Now enterprises have many such measures beyond just DNS. They have firewalls, proxies, IPS which secure users as they access the WWW. The most effective of these tehcnologies are the proxy. During my time at Symantec,…
-
DNS Security – Internet Safety 101
The Domain Name System (DNS) in basic terms is what allows your browser uses to reach a website. Think of it as a Map – with latitudes and longitudes. When you search in google maps for a place, it converts it to a longitude and latitude on the map and shows you a result. ImageSrc: GeeksforGeeks The…
-
/genesis
Over time, my passion for cybersecurity has grown, driven by a deep appreciation for problem-solving. The dynamic nature of the challenges we face in cybersecurity, both at a macro level and in our daily routines, never fails to captivate me. Each day presents unique problems, and adaptability is the key constant. This principle not only…
