Technical Blog

Insights on Security, Auditing, and Operations.

Auditing

Auditing SQL Server for Anomalies

How to use T-SQL to identify unauthorized access patterns without external tools.

Read Article
Blue Team

Defending Against Ransomware in 2025

Strategies for critical infrastructure protection beyond the perimeter.

Read Article
Governance

Implementing ENS in Public Sector

Lessons learned from deploying the National Security Scheme in a police environment.

Read Article