March 1, 2024

Cisco Live Melbourne SOC Report

Executive Summary. 1 The Team… 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco […]
February 28, 2024

Enterprise security: Making hot desking secure and accessible on a global scale

Making hot desking secure and accessible on a global scale The first rule of interviewing a CISO at the Australian division of Laing O’Rourke is this: […]
February 27, 2024

Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL. Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on… […]
February 27, 2024

The Real Deal About ZTNA and Zero Trust Access

ZTNA hasn’t delivered on the full promise of zero trust Zero Trust has been all the rage for several years; it states, “never trust, always verify” […]