In this blog (the title is inspired by some Slipknot lyrics this time: “If rain […]
Honeypot: The Last Reconnaissance
After reading this fantastic article on the Technet Community about the Attack Kill Chain, I […]
This is Network Protection: The sort of Sequel to Exploit Protection
This blog is the eighth part of the Endpoint Security series and will be about […]
A Walk Among the Credential Guards
This blog is the ninth part of the Endpoint security series. It will discuss implementing Credential Guard and […]
The Exploit Protection Between us
This blog is the fifth part of the Endpoint Security Series and will be about […]
Married with Controlled Folder Access(CFA)
This blog is the second part of the Endpoint Security series. This part will be […]
Zero Trust Security Flow
Everything is about Zero trust security; you will need to implement it. Many articles have […]
The Blind Event Log
This blog will be about why sometimes the Windows Microsoft Defender event log, does not […]
Interview with the ASR rules
Protecting your devices with Microsoft Defender ASR rules is best practice, but ensure you know […]