Research conducted by KnowBe4[1] found that one out of three people is likely to click on a suspicious link or comply with a fraudulent request. For this reason, phishing remains a valid concern for organisations. The primary objective of phishing is to get someone to...
Log management is an important and foundational aspect of security; however, it is often overlooked. It is common to view security logging and monitoring as one function—that is, logging-and-monitoring. It is easy to lose sight of the fact that security logging is...
I’ve come to the cross-road where I’ve seen that at point where have all skill and no Certs you can’t…