Category: Hacking

0

Webinar Series Update: Evading Anti-Virus

In the webinar I gave last week based on “How attackers break in“, there were several questions at the end that focused on password management and then also evading anti-virus. During the webinar, I...

0

Research Report and Webinars

Earlier this year, I had to chance to be a part of a Cyber Research Project in conjunction with Christian Buckley (http://www.buckleyplanet.com) from CollabTalk (https://collabtalk.com) and the Marriott School of Management at Brigham Young...

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...

0

Where is Liam?

It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We have normally got through the winter time and the...

0

Using Risk-based Multi-Factor Authentication – Reporting

In the last post: Using Risk-based Multi-Factor Authentication, I talked about setting up the risk-based policies, in this post we will look at the reporting and alerting mechanisms that are available. Within the Azure...

1

What does GDPR mean for you and Office 365

By now you will have heard about the new General Data Protection Regulation (GDPR) that will be coming into effect shortly. This was started by the European Commission in 2012 and finally generally agreed...