by Alexander | 12 September 2024
Active Directory (AD) is a directory service developed by Microsoft for Windows Server operating systems. It is a hierarchical, distributed database that stores information about network objects such as users, computers, groups and resources.
by Alexander | 6 February 2025
In cyber security, physical isolation, also known as network isolation or air gap, is a protection technique that involves physically disconnecting a system or network from the rest of the infrastructure connected to the Internet or other unsecured networks.
This means that isolated data and systems cannot be directly compromised by attacks from the Internet or other unsecured sources.
by Alexander | 4 February 2025
A security alert is a structured, prioritised mechanism designed to report in real time an active threat, a critical vulnerability or an incident in progress that compromises the security of a system, network, organisation or critical infrastructure. Issued by automated systems (e.g. SIEM, IDS/IPS) or certified authorities (ANSSI, CISA, CERT-FR, etc.), it aims to trigger a rapid, coordinated response to mitigate risks and protect digital assets.
by Alexander | 14 February 2025
Behavioural analysis is a proactive detection method designed to identify suspicious activities by analysing the behaviour patterns of entities (users, systems, applications)....
by Alexander | 26 February 2025
Predictive analytics is a specialised branch of artificial intelligence that uses historical data, statistics and machine learning techniques to identify trends and patterns in order to predict future events or outcomes.
It is based on the idea that past data can provide valuable insights into what might happen in the future. The main objective is to provide informed estimates of what might happen, enabling proactive and strategic decision-making.