Some time ago, I became concerned about unnoticed sources that had stopped sending logs to our SIEM system. This issue can have serious consequences, ranging from undetected attacks to compliance violations, so I began searching for a reliable solution. The…
Some time ago, I had the opportunity to configure File Integrity Monitoring (FIM) on the CrowdStrike platform. The setup was relatively straightforward, except for one aspect – email alerts. When configuring notifications for file changes, I found two native options…
Many years ago, I was concerned about how passwords were sent in the organization where I worked. We didn’t have any standardized solution, so various methods such as mobile texts, emails, and chat were used – methods that weren’t necessarily…
In today’s digital landscape, Multi-Factor Authentication (MFA) is becoming a standard security measure across various platforms, from Microsoft 365 to online applications and server access. But should we extend MFA to laptop and workstation logins? The answer isn’t straightforward, as…
Some time ago, I was assigned the task of implementing a File Integrity Monitoring (FIM) solution for PCI-DSS compliance. At that time, I was managing Cortex XDR as the company’s Endpoint Protection, but it did not include a dedicated FIM…