🔐 Backups are the last line of defense — and attackers know it.
I put together a full defense-in-depth guide covering identity isolation, network segmentation, immutability, offline media, and operational hardening.
Read it here:
https://jonahmay.net/defense-in-depth-across-identity-network-storage-physical-and-operational-domains/

#CyberSecurity #Backup #DefenseInDepth #DataProtection

Strengthen Your Veeam Backup Security Framework

Protect your data with effective defense strategies. Read more!

Jonah's Blog
Building Defense-in-Depth Encryption: A Cascading Cipher System | positive-intentions

⚠️ NOTE: This document and related project is not finished. The details in this document are subject to change.

positive-intentions

#ClickFix attacks remain a very serious threat to organisations.

In my latest #blog #post I explore what these attacks are, and how we can leverage a #defenseindepth approach to #protect ourselves and our users from them.

#cybersecurity #cyber #microsoft #email

https://marshsecurity.org/protecting-against-clickfix-with-the-microsoft-stack/

Web App Security Architecture: Implementing Defense-in-Depth

In this article, we are going to explore the defense-in-depth principle applied to web applications. Actually, it can apply to most software. Nowadays, modern software is designed with an internet…

TechSplicer Blog

John Poulin joins the Security Repo Podcast to break down #DefenseInDepth, audit logs, and why security headers are the new "bank-grade encryption." 🔐

🎧 Listen now:
https://buff.ly/3D0Le8C

Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin

YouTube
Mfa-bypass ontrafeld: waarom meerfactor-authenticatie niet volstaat / Hacking / Cybercrime / Menu Onderwijs & Ontwikkeling | CyberCrimelnfo.nl | De bibliotheek van Cybercrime en Darkweb

MFA is niet onfeilbaar: ontdek hoe cybercriminelen authenticatie omzeilen met technieken zoals phishing, MFA-fatigue en sim-swapping. Leer effectieve verdedigingsstrategieën.

Joomla Web Services WITHOUT Super User. Least Privilege Principle. One of the fundamentals of Information Security.
https://apiadept.com/technical/joomla-web-services-without-super-user
#acl #cybersecurity #blueteam #defensivesecurity #leastprivilegeprinciple #defenseindepth #joomla #developer
Least Privilege Principle : Joomla Web Services Without SuperUser

Use Joomla Web Services without Super User. Least Privilege Principle. One of the Defensive App Security Fundamental.

There's this thing about resilience engineering being more about being ready for dragons around the next corner than trying to guess where all the holes are in the swiss cheese.

I enjoy high nerd humor.

#ResilienceEngineering #ThereBeDragons #WhenSwissCheeseModelsFail #DefenseInDepth #Complexity https://mastodon.zergy.net/@Enalys/113656847324163454

Enalys :enalys: (@Enalys@mastodon.zergy.net)

Attached: 1 image cc @baralheia@dragonchat.org 🧀 :dragn_o: (Done by Trioza)

Zergydon