Security Operations Centre – part 2

Security Operations Centre – part 2

Eugene Wypior Security Operations Centre – part 2 You can only truly protect what you know you have 1. Asset inventory You must understand what your assets are in order to understand what you are going to protect. Make sure you have identified all the devices...
Security Operations Centre – part 1

Security Operations Centre – part 1

Eugene Wypior Security Operations Centre – part 1 What is a Security Operations Centre (SOC)? As with many concepts, there isn’t one single definition as to what a Security Operations Centre (SOC) is. According to the SANS Institute, SOC is a combination of...
Zero Trust Architecture

Zero Trust Architecture

Eugene Wypior Zero Trust Architecture For many years the infrastructure security model was based on securing the perimeter of the environment. Defenses were built at the perimeter of the network to prevent malicious actors from getting inside. However, once an...
Data Privacy, Data Security, Vol. III

Data Privacy, Data Security, Vol. III

Eugene Wypior Data Privacy, Data Security, Vol. III Browser hardening There are many layers at which you can improve your security and privacy. Apart from the layer of the operating system and its settings, the layer of applications, the next important layer is the...
Data Privacy, Data Security, Vol. III

Data Privacy, Data Security, Vol. III

Eugene Wypior Data Privacy, Data Security, Vol. III Privacy & Security improvement tips for Windows users (and many others) 1. Password Use a strong password, something easy to remember but difficult to hack. There are a few good concepts around such as to use...