IBM X-Force Threat Intelligence Index 2025, Initial Thoughts

IBM produces two reports every year focused on cybersecurity: the X-Force Threat Intelligence Index and the Cost of a Data Breach Report. Both are invaluable sources of data for anyone interested in cybersecurity. The first of these reports, the Threat Intelligence Index, was released on April 17th. While I have not digested everything it contains,... Continue Reading →

Is Red Teaming the Perfect Use Case for Gen AI?

In general, enterprise adoption of Generative AI, has probably not been as rapid as most people were expecting.  There are several reasons for this, some of which I have discussed previously, such as concerns over data security, privacy, bias etc.  One area that I have not really covered previously is around use cases, I think... Continue Reading →

Understanding Zero Trust in the Microsoft Cloud: Part 2

Foundational Components, Identity in a Zero-Trust model. As discussed in Part 1, Zero-Trust is a security model that relies on the key principle of Never Trust, Always Validate.  This means that, in effect, you assume that your estate has already been breached, and users, devices and applications must be continuously challenged and monitored.  In this... Continue Reading →

Understanding Zero Trust in the Microsoft Cloud: Part 1

Zero-Trust is a fascinating topic, and looking back at some of the statistics behind this blog and the related YouTube channel, it is not only me who is interested in this subject matter. However, I realised that most of the content I have created on this subject was aimed at people who, at a minimum, had a basic knowledge of what Zero Trust is and why it is an essential element in most organisations’ cyber security strategy. As a result, I decided to create a series of posts (and possibly a video) starting from the beginning, i.e., what zero trust is, its benefits, and some considerations.

Website Built with WordPress.com.

Up ↑