TENANT ALLOWBLOCK LIST AN UNDERUSED FEATURE WITHIN EXHANGE ONLINE?
⚠️ Before you start ⚠️ This blog post assumes that you have M365 E5, which grants you access to Microsoft Defender for Office 365 Plan 2.
Read morePART 3: THE REDO AKA NCSC CAF DEMYSTIFIED
“Why is this a redo?” This post should have come before this one mapping Microsoft tools to CAF controls and more.
Read morePART 2: ASSESSING YOUR CYBER POSTURE – WHERE ARE YOU TODAY?
“Before the audit, comes the mirror.” Are you ready to face your cyber reflection?
Read moreGISSEC GLOBAL 2025
Last week, I had the incredible opportunity to attend GISEC Global 2025 in Dubai, a flagship event fast becoming one of the premier gatherings for cybersecurity professionals worldwide.
Read moreWORLD PASSWORD DAY 2025
World Password Day 2025: Stronger Passwords, Smarter Identity Every first Thursday in May, World Password Day rolls around and in 2025, it’s still as relevant as ever.
Read moreTHE BIG SHIFT - UK CYBERSECURITY RESILIENCE BILL
Why the Cybersecurity and Resilience Bill is Your 2025 Wake-Up Call As the dust settles on the UK Government’s announcement of the Cyber Security and Resilience Bill, it’s clear that 2025 isn’t just another year; it’s the inflexion point.
Read moreIDENTITY MANAGEMENT DAY 2025
Introduction: A Day to Reflect on Identity Every second Tuesday in April, the cybersecurity community takes a moment to recognise Identity Management Day, a reminder that safeguarding our digital selves is more than just a best practice; it’s a critical necessity.
Read moreGITHUB ACTIONS RUNNING ENTRA AUTHENTICATION METHODS REPORT
In this post, we are going to look at automating the generation of a PowerShell report from Daniel Bradly.
Read moreQUANTUM ENCRYPTION STANDARDS
What a way to break the blogging hiatus with a blog about something to look forward to in the future.
Read moreTENABLE AZURE SERVICE TAGS RISK
Earlier this week, I was asked to comment on the recent disclosure by Tenable and the apparent risk around the usage of Azure Service tags.
Read more