Image for post
Image for post
Photo by Daniel Monteiro on Unsplash

Many centuries ago and long before there was this thing called “The Internet”, there were seven deadly sins. These were greed, gluttony, lust, envy, sloth, wrath, and pride and while it may sound like I have just described most social media sites, modern times have given rise to their cybersecurity sin counterparts.

We may feel like we have been living a digitally vicarious existence online since ancient times, but the shortcomings of humanity now manifest in a digital form. Over the past several decades of working in technology, and the majority in the realm of cybersecurity, there are many offences observed we commit daily. …


Image for post
Image for post
Image Credit: David Holifield

Original Article from Noel Fairclough, Modern Work Principal Consultant specialising in Microsoft 365 at Data#3 Limited.

In this article I discuss how Microsoft 365 E5 licensing enables your organisation to get that perfect balance between cost, security, and productivity.

The phrase “You can’t have your cake and eat it too” is an English idiomatic proverb that has been a popular saying in one form or another for almost 500 years. It means “You cannot keep your cake, if you want to eat your cake” — in other words, once you have eaten your cake, it is gone. …


Image for post
Image for post

“Zero Trust” is becoming yet another one of those fancy marketing terms akin to the way “Information Superhighway” used to be. Nearly everyone selling products and services in cybersecurity has a “Zero Trust” offering. Before the offering becomes a solution, it must be understood, implemented, and used to meet its intent, but herein lies the confusion.

What is a “Zero Trust” approach/framework/methodology/whizbang what-cha-ma-call-it, anyway? Nearly everyone I have spoken with has a different approach, so I’ve tried to put some of them together in a single workflow to make sense. …

About

Digitally Vicarious

Logan Daley. Aspiring CISO. Enterprise Security Architect. Information Assurance & Privacy Specialist. Cybersecurity Presenter, Entertainer, and Writer.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store