Home New Trending Search
About Privacy Terms
#
#DefenseInDepth
Posts tagged #DefenseInDepth on Bluesky

The fix? Defence in depth.
Assume the AI WILL fail.
Layer imperfect safeguards until holes don’t align.

Swiss cheese model for civilizational infrastructure.
Pragmatic. Not utopian. #DefenseInDepth #AIGovernance

0 0 1 0
Preview
The Moon Landing and the Accidental Invention of Cybersecurity By Bradley Schagrin

How Not Killing Three Guys in a Tin Can Accidentally Invented Cybersecurity
shorturl.at/YTKNF
#Cybersecurity #ZeroTrust #IncidentResponse #IdentitySecurity #DigitalResilience

#Apollo11 #SpaceHistory #CloudSecurity #SOC #RiskManagement

#DefenseInDepth #Leadership #DataIntegrity

1 1 0 1
Post image

Security tools that live outside the operating system can only react. The most effective defenses are the ones built into the OS itself: enforcing integrity, catching tampering, and reducing blast radius in real time.

Prevention beats cleanup. Every time […]

[Original post on mastodon.social]

0 0 0 0
Post image

Defense-in-depth matters. Microsoft unifies DLP, IRM, and more with Purview.

jadexstrategic.com

#defenseindepth #dlp #insiderrisk #adaptiveprotection #microsoftpurview #jadexstrategicgroup

0 0 0 0
Post image

At some point you stop asking questions and just escalate the cat.

#ThreatModeling #Escalation #SecurityHumor #RiskManagement #SystemsThinking #DefenseInDepth

1 1 0 0
Post image

This is what happens when your defense strategy is technically correct but wildly outmatched.

#Cybersecurity #ThreatModeling #RiskManagement #DefenseInDepth #SecurityThinking #SystemsThinking #HumanBehavior

1 1 0 0

Upgrade to 1.4.17 immediately—especially if your app takes input from untrusted clients. If you sanitize or block __proto__ at your edge, your exposure is lower, but patching remains the safest path.
#PatchNow #APIsecurity #NodeJS #DefenseInDepth 🧵4/5

0 0 1 0
Post image Post image Post image

Wrapped up Day 2 of Black Hat MEA participating in a Fireside Chat with two amazing security leaders Trina Ford and Priya Mouli. We talked about the promise of agentic AI and the underlying risks that businesses and cyber professionals need to address. #BlackHatMEA #AgenticAI #DefenseinDepth

1 0 0 0
Preview
Moats, Watchtowers, and Firewalls: Samurai Strategies for Modern Cybersecurity Plus Executive Manual -Building Digital Castles to Outlast Attacks

Moats, Watchtowers, and Firewalls: Samurai Strategies for Modern Cybersecurity
open.substack.com/pub/bradleys...
#CyberSecurity #DefenseInDepth #ZeroTrust #TechLeadership #CyberResilience #DigitalStrategy #SamuraiWisdom #SecurityArchitecture #ExecutiveLeadership #Observeid

2 1 0 1
Preview
Strengthen Your Veeam Backup Security Framework Protect your data with effective defense strategies. Read more!

“Backup systems are the new battlefield.”
I just published a breakdown of how to build a real defense-in-depth strategy across identity, network, storage, physical, and operational layers.
Check it out:
jonahmay.net/defense-in-d...

#cybersecurity #backups #defenseindepth

2 1 0 0
Preview
The Moon Landing and the Accidental Invention of Cybersecurity How Not Killing Three Guys in a Tin Can Taught Us Everything About Modern Data Integrity

The Moon Landing and the Accidental Invention of Cybersecurity
open.substack.com/pub/bradleys...
#Cybersecurity #ZeroTrust #IncidentResponse #IdentitySecurity #DigitalResilience

#Apollo11 #SpaceHistory #CloudSecurity #SOC #RiskManagement

#DefenseInDepth #Leadership #DataIntegrity

3 1 0 0
Post image

🧠 Strong cybersecurity = layered defense. Firewalls, antivirus, MFA, and human training together form a resilient shield. No single tool is enough. 🛡️ #DefenseInDepth

0 0 0 0
Post image

Plugging the Holes: The Swiss Cheese Model of Cyber Defense
youtu.be/bR3y5efWoGE #CyberSecurity #RiskManagement #DefenseInDepth #SwissCheeseModel #Phishing #PatchManagement #NetworkSecurity #EndpointSecurity #IncidentResponse #Governance #AIinCybersecurity

1 0 0 0
Preview
Building a Layered Security System to Prevent Cyber Attacks in Corporate Environments By Muhammed Shafin P (@hejhdiis) In today’s world, cybersecurity threats are becoming increasingly...

Building a Layered Security System to Prevent Cyber Attacks in Corporate Environments By Muhammed Shafin P (@hejhdiis) In today’s world, cybersecurity threats are becoming increasingly sophistica...

#hejhdiss #cybersecurity #virtualmachine #defenseindepth

Origin | Interest | Match

0 0 0 0
Preview
Moats, Watchtowers, and Firewalls: Samurai Strategies for Modern Cybersecurity Plus Executive Manual -Building Digital Castles to Outlast Attacks

Moats, Watchtowers, and Firewalls: Samurai Strategies for Modern Cybersecurity-Plus Executive Manual Building A Digital Fortress open.substack.com/pub/bradleys...
#CyberSecurity #DefenseInDepth #ZeroTrust #TechLeadership #CyberResilience #DigitalStrategy #ExecutiveLeadership

3 1 0 1
Preview
Web App Security Architecture: Implementing Defense-in-Depth In this article, we are going to explore the defense-in-depth principle applied to web applications. Actually, it can apply to most software. Nowadays, modern software is designed with an internet…

🛡️ Web App Security Architecture: Implementing Defense-in-Depth
alexmacra.com/cybersecurit...
#WebSecurity #DefenseInDepth #CyberSecurity #AppSec

0 0 0 0
Defense in Depth: How to Layer Your Personal Digital Security A practical, layered guide to help everyday people improve their digital security using enterprise-grade Defense in Depth principles.

So, a while back I set out to write a post that applies Defense in Depth to everyday digital life. It started simple, non-tech friends in mind, but I couldn't resist sprinkling in some techie stuff too. 😅 Layers, folks. Start with one.

seeknay.com/security/dig...

#defenseindepth #techtips

1 0 1 0

Some decent AppSec advice in here from a security chief at Sony.

www.darkreading.com/vulnerabilities-threats/...

#appsec #defenseindepth

1 0 0 0
Video thumbnail

Video covering enabling Conditional Access for your Microsoft 365 environment.

BlueFolder(.)zip
Defensive insights in a compressed format.

🌐 Website:
Bluefolder.zip

📺 YouTube:
youtube.com/@bluefolder_zip

#BlueTeamResources #M365Training
#DefenseinDepth #BlueTeam
#ConditionalAccess #entra

0 0 0 0
Video thumbnail

Video covering deployment of 🛡️ Defender on your macOS 💻 device.

BlueFolder(.)zip
Defensive insights in a compressed format.

🌐 Website:
Bluefolder.zip

📺 YouTube:
youtube.com/@bluefolder_zip

#BlueTeamResources #M365Training
#DefenseinDepth #BlueTeam
#macOS #IntuneApple #Defender #AppleDevices

0 0 0 0
Video thumbnail

Video covering enrolling your Apple 🍎 devices to Intune.

BlueFolder(.)zip
Defensive insights in a compressed format.

🌐 Website:
Bluefolder.zip

📺 YouTube:
youtube.com/@bluefolder_zip

#BlueTeamResources #M365Training
#DefenseinDepth #BlueTeam
#macOS #IntuneApple #IntuneEnrol #AppleDevices #M365

0 0 0 0
Video thumbnail

Video covering enabling Platform SSO for macOS, as well as Enterprise SSO plugin.

BlueFolder(.)zip
Defensive insights in a compressed format.

🌐 Website:
Bluefolder.zip

📺 YouTube:
youtube.com/@bluefolder_zip

#BlueTeamResources #M365Training
#DefenseinDepth #BlueTeam
#macOS #IntuneApple

0 0 0 0
Video thumbnail

👀 whoami

BlueFolder.zip is now on the only blue social media platform.

Check it out!

#DefenseInDepth #BlueTeam #Educational #DefensiveInsights
@bsky.app

0 0 0 0
Post image

When to Use NSG vs. Azure Firewall vs. Application Gateway
✔ NSG = Basic port filtering, VM-level
✔ Firewall = Centralized, stateful L3-L7 protection
✔ App Gateway = TLS termination + WAF for HTTP/S
🚀 Pro Tip: Use all 3 together for defense-in-depth!
#CloudSecurity #Azure #DefenseInDepth

0 0 0 0
Post image

John Poulin joins the Security Repo Podcast to break down #DefenseInDepth, audit logs, and why security headers are the new "bank-grade encryption." 🔐

🎧 Listen now:
https://buff.ly/3D0Le8C

0 0 0 0

https://buff.ly/4gy8Q2l
🏰🛡️ Build multiple protective layers and continuously adapt to guard against ever-evolving threats! 🔒✨ #CyberSecurity #DefenseInDepth #StayProtected

0 0 0 0
Post image

🔒Defense-in-Depth: Multilayered Cybersecurity

#cybersecurity #infosec #defenseindepth #dataprotection #cyberawareness

0 0 0 0
Least Privilege Principle : Joomla Web Services Without SuperUser Use Joomla Web Services without Super User. Least Privilege Principle. One of the Defensive App Security Fundamental.

Joomla Web Services WITHOUT Super User : Least Privilege Principle #cybersecurity #blueteam #defenseindepth #joomla #webservices #acl

1 0 0 0
Preview
Mfa-bypass ontrafeld: waarom meerfactor-authenticatie niet volstaat / Hacking / Cybercrime / Menu Onderwijs & Ontwikkeling | CyberCrimelnfo.nl | De bibliotheek van Cybercrime en Darkweb MFA is niet onfeilbaar: ontdek hoe cybercriminelen authenticatie omzeilen met technieken zoals phishing, MFA-fatigue en sim-swapping. Leer effectieve verdedigingsstrategieën.

#MFA #Cybercrime #Hacking #Authentication #Phishing #MFABypass #SimSwapping #SocialEngineering #MFAFatigue #SecurityAwareness #DefenseInDepth #CyberSecurity #PhishingResistantMFA #EndpointDetection #EDR #IncidentResponse #Security #CyberAttack #Darkweb #HumanFactor

www.ccinfo.nl/menu-onderwi...

0 0 0 0