top of page

Security Blog
Search


Buying the latest Next-Gen Security Product isn't a silver bullet solution
The IT industry has a constant stream of sales waffle and acronyms for the latest and greatest technology. Whether it's Next-gen...
Aug 19, 20232 min read
84 views


Configuring Azure PIM with Security Groups
So firstly what is Azure PIM? Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to...
Aug 6, 20234 min read
1,133 views


Identity PowerToys
Created by Merill Fernando, IdPowerToys provides a slick method to see all of your existing Conditional Access Policies in an easy to...
Jul 8, 20232 min read
754 views


Using Chat GPT for Powershell Scripting
What's Chat GPT? Chat GPT, or Generative Pre-training Transformer, is a powerful tool that can assist in writing PowerShell scripts....
Dec 27, 20222 min read
134 views


Building a Career in Cyber Security
These days you apparently need five years’ experience in security before the age of 12 to even be considered an entry level position...
Dec 22, 20224 min read
75 views


Vulnerability Management is Tough!
Your auditors have identified a gap where you need to start carrying out vulnerability assessments on your infrastructure and patch...
Dec 22, 20222 min read
39 views
bottom of page