top of page

WELCOME TO CRONINITY

Home: Welcome

Defender XDR - Part 5f - Unified Console

Rolling Aerts into Incidents - XDR A key strength of Microsoft Defender is its ability to correlate disparate alerts from various detection sources into a single, cohesive incident view. This approach enables defenders to understand an attack or compromise holistically rather than managing fragmented alerts. Microsoft Defender XDR extends this capability by continuing to unify and correlate alerts from multiple security domains, identity, endpoint, email, and cloud applicatio

Microsoft SC200 Certification - Microsoft Copilot - Part 8

Microsoft Copilot Overview Microsoft has named its Artificial intelligence (AI) product Copilot. Microsoft currently offers the following AI products. Microsoft Security Copilot is the AI product that is covered in the SC-200 exam. Copilot for Microsoft 365 : This version is designed for businesses and integrates AI into Microsoft 365 apps like Word, Excel, PowerPoint, Outlook, and OneNote. Copilot for Sales : This version helps sales teams maximize effectiveness and close

Microsoft SC200 Certification - Microsoft Purview - Part 4

Microsoft Purview is a unified data protection and governance platform that combines legacy Microsoft security tools with new, advanced capabilities to help organizations safeguard their data. It provides a broad range of solutions, enabling multiple teams within an organization to collaborate effectively in achieving data protection, governance, and compliance. Why Microsoft Purview Stands Out Extensive Coverage – It integrates Data Governance, Data Loss Prevention (DLP), In

Microsoft SC200 Certification - Microsoft Endpoint & eXtended Detection Response (EDR/XDR) Part 2D - Microsoft Defender for Cloud Apps (MDCA)

Microsoft Defender for Cloud Apps (MDA) Microsoft  Defender for Cloud Apps (MDA) primarily focuses on discovering and assessing the applications used within your environment. It includes a risk rating system that evaluates app risk levels, enabling you to establish policies that restrict or allow the use of specific applications. MDA also monitors for suspicious app behavior. For instance, consider an app like AZCopy, a Linux-based tool for transferring data from Azure. If an

Microsoft SC200 Certification - Microsoft Endpoint & eXtended Detection Response (EDR/XDR) Part 2C - Microsoft Defender for Office (MDO)

Microsoft Defender for Office365 (MDO) Think of MDO as your email security gateway, constantly scanning emails to defend against phishing, malware, and spoofing attempts. Here's how it works: Analyzing Email Sources : Evaluates the origin of emails, checking against databases of known malicious senders and infrastructure. Verifying Sender Authenticity : Confirms whether the sender's identity, brand, and domain are legitimate. For external domains, spoof intelligence ensure

Microsoft SC200 Certification - Microsoft Endpoint & eXtended Detection Response (EDR/XDR) Part 2B - Microsoft Defender for Identity (MDI)

Microsoft Defender for Identity (MDI) Identity Protection: Understanding and Addressing Identity-Based Threats Identity protection focuses on identifying and mitigating weaknesses and threats related to identity systems. The adage "Identity is the new perimeter" may be overused, but it accurately highlights the reality of modern cybersecurity. Threat actors target identities because they grant access to systems and sensitive information. With the growing shift to cloud-based

Microsoft SC200 Certification - Security Operations Analyst - Part 1

Demystifying the Microsoft SC-200 Certification The Microsoft SC-200 certification is designed for cybersecurity analysts and engineers who work with Microsoft's security solutions. According to Microsoft, the SC-200 course teaches professionals how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Defender for Cloud. Microsoft is a dominant player in the cybersecurity industry, offering a broad suite of security

CISO MindMap & Maturity - Part 4 - 'Identity Management'

Many Identity & Access Management frameworks are several years old, so care needs to be taken on what a mature 'Identity management' looked like in 2010 versus 2025. Gartner Identity & Access Management (IAM) Maturity Model One of the primary maturity models used for Identity and Access Management (IAM) is the Gartner IAM Maturity Model. This model evaluates IAM maturity using standard capability maturity levels—Initial, Developing, Defined, Managed, and Optimized, across key

CISO MindMap & Maturity - Part 3a - 'Security Operations' - 'Threat Prevention'

Within the CISO MindMap, Security Operations encompasses three major domains: Threat Prevention, Threat Detection, and Incident Management. This article focuses specifically on the Threat Prevention domain and examines several maturity models that apply to key subdomains within this area. Threat Prevention Threat Prevention spans a broad range of capabilities and is heavily influenced by an organization’s operational environment and technology stack. While many subdomains hav

CISO MindMap & Maturity - Part 2 - 'Team Management'

One of the first areas of the CISO MindMap we will examine is Team Management, which encompasses both Information Security Budget Management and Staffing and Talent Management. There is no single, universally adopted “Security Budget Capability Maturity Model” dedicated specifically to IT or information-system security budgeting. However, several established capability maturity models include budgeting, financial governance, or resource optimization as part of broader securit

CISO MindMap & Maturity - Part 1

CISO MindMap Overview A few years ago, I came across the CISO MindMap, “What Security Professionals Really Do?”, developed by Rafeeq Rehman. It remains an excellent reference for cybersecurity practitioners, especially those in leadership roles. The MindMap is available publicly and continues to be updated as the field evolves. Cybersecurity professionals often develop deep expertise in one or more domains, but may not have full visibility into the breadth, interdependencies,

AI - The AI Supply Chain - AI Data Center Networks - Part 2 - Data Center Network Switch fabrics

Today’s AI Systems and need for High-speed interconnects Modern AI systems resemble supercomputers far more than traditional web-scale architectures. This is because AI workloads, especially distributed training using data-parallel, model-parallel, or tensor-parallel techniques, place enormous demands on east-west bandwidth between GPUs. These GPU-to-GPU exchanges include: Gradient sharing Parameter synchronization Checkpointing and state transfers Collective operations such

AI - The AI Supply Chain - Data Center Networks - Part 3 - Different types of AI Data Center Networks

AI's Multiple Networks: Understanding the Layers of Connectivity Modern AI infrastructure uses multiple specialized networks, each with distinct performance, reliability, and cost requirements. These networks are typically organized into four or five tiers, ranked below from lowest to highest by speed, performance demands, and connectivity needs. Because each network tier has different requirements, they use different cabling and hardware at varying price points. Within each

AI - The AI Supply Chain - AI Data Center Networks - Part 1 - History of Data Center Networks

The Critical Role of Networking in AI Beyond power and cooling, and beyond the specialized servers and AI accelerators themselves, one of the most essential, and often underestimated, components of any AI infrastructure is the network fabric that interconnects those systems. In NVIDIA’s AI Factory reference model, the network is not a supporting element; it is a core pillar that determines how efficiently AI workloads scale, communicate, and perform. Just as AI chips continue

AI in Security Operations Centers - Microsoft Defender

Security CoPilot - Reference Diagram Overview The component labeled “Security Copilot” functions primarily as an orchestrator that bridges the Microsoft environment with the OpenAI LLM operating within Microsoft’s secure ecosystem. In Microsoft Security Copilot, Copilots function primarily as orchestrators rather than traditional AI models using embeddings or vector databases. Instead of performing semantic searches or querying internal data stores, Copilots leverage plugins

AI in Security Operation Centers

Standard IR Data Analysis phases A practical way to evaluate AI’s impact on incident response (IR) is by examining how it enhances the data analysis phases that analysts perform during alert triage and incident handling. These are analytical stages, distinct from the traditional IR lifecycle of Identification, Containment, Eradication, Recovery, and Lessons Learned. The core data analysis phases include: Planning, Search (including Data Collection and Parsing), Normalization,

Microsoft Security Copilot for SOC Operations Test Plan

Test Plan - Test 1: Installation and Configuration of Microsoft Security Copilot and Applicable Plugins Background Microsoft Security Copilot leverages AI-driven orchestration across Microsoft security tools using integrated plugins and agents. Its performance depends on Security Compute Units (SCUs), the measure of compute capacity required to run Copilot workloads. SCUs are billed per hourly activation, not per-minute increments. Each activation incurs a minimum charge of o

Cyber Risk Concepts - CRISC certification notes - Part 4 - IT Systems

CRISC IT Systems Topic areas: Information Technology Principles Enterprise architecture: Managing and governing the overall structure of an organization's IT systems. IT operations management: Handling the day-to-day IT processes, such as change management, IT asset management, and incident management. Project management: Applying risk management principles throughout the system development life cycle (SDLC). Disaster recovery management (DRM): Creating and maintaining a plan

Cyber Risk Concepts - CRISC certification - Part 3 - Risk Monitoring & Reporting

Moving from Risk Assessment to Risk response & Reporting Once a risk has been identified and assessed, the next step is to ask: What will we do about it? This is where risk treatment or risk response comes into play, selecting the most appropriate action to manage the risk. Risk Response Risk and Control Ownership: Assigning accountability for risks and the controls that address them. Risk Treatment/Response Options: Deciding on the appropriate strategy for addressing ident

Cyber Risk Concepts - CRISC certification notes - Part 2 - Risk Assessment

Risk Evaluation & Risk Assessment Once the scope of the risk analysis is clearly defined, the next critical phase is Risk Assessment & Evaluation. This stage involves assessing the potential risks to the organization's people, assets, and data within the context of the defined system or environment. Risk Assessment & Evaluation serves as the analytical core of any cyber risk management process. While much of the industry content and discussion around cyber risk tends to focus

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page