Brian Baldock
Brian Baldock boosted:
2025-05-24

The most convenient and efficient way to operate a bank is where everything you need for customers is in easy reach.
So why do we store cash and valuables in bank vaults and safety deposit boxes?
Because it would be insanely easy to steal!

…but with digital businesses, we somehow overlook this and allow/encourage putting business critical assets and the ability to access them (administrative credentials) out 'in the open' on BOYDs and regular corporate laptops where people do email and web browsing to any old sites.

Microsoft published guidance on securing privileged access (aka.ms/spa) including the use of privileged access workstations (aka.ms/PAW) to change this practice that puts your organization at risk.
Please read and follow this guidance to get these out of the reach of any casual attacker!

2025-04-11

Push MFA = easy to phish.
Read why number matching doesn’t fix it, and how to implement real phishing-resistant MFA for your business.
blog.brianbaldock.net/mfa-beyo
#CyberSecurity #FIDO2 #EntraID

2025-03-26

🔥 Cloud protection isn’t optional in 2025.
Defender for Endpoint works best when it can reach the cloud. But what about isolated networks? Proxies still play a key role. Here’s how to securely bridge the gap while keeping control: blog.brianbaldock.net/mde-prox
#MDE #CyberSecurity #CloudSecurity

2025-03-20

💡 Think your disconnected environment can’t use AI-driven protection? Think again.
With Microsoft’s Streamlined Connectivity, enabling Defender for Endpoint in restricted networks has never been easier. Proxies make it possible—here’s how to do it right: blog.brianbaldock.net/mde-prox
#CyberSecurity #DefenderForEndpoint #XDR

2025-03-11

Proxies aren’t the enemy—they’re the bridge. 🔐

Defender for Endpoint needs the cloud to deliver real-time protection, but in restricted networks, proxies remain essential. With fewer URLs to allow-list in 2025, securely enabling Defender is easier than ever.

Read how to get it right: blog.brianbaldock.net/mde-prox

#CyberSecurity #MicrosoftDefender #XDR #Proxies

2025-02-26

Security teams often conflate "internet access" with "lack of security." But if HTTPS/TLS is restricted to trusted services, does it really differ from a VPN tunnel?

A properly pinned HTTPS/TLS connection provides encryption, data integrity, and authentication—without exposing systems to the open internet.

I explore this in my latest blog post. Read more here: blog.brianbaldock.net/defender

#CyberSecurity #VPN #CloudSecurity #ThreatIntel

2025-02-24

You don’t need a data center to run an AI chatbot. Just Docker.
I used an RTX 3080, Docker Compose, and NGINX to build mine—secure, fast, and private.
Here’s how: blog.brianbaldock.net/deployin

2025-02-20

Tired of paying for AI APIs? Run your own.
I built a local AI chatbot using vLLM, NGINX, and Docker—fully private, fast, and API-free.
Learn how: blog.brianbaldock.net/deployin
#AI #LLM #SelfHosting #Docker #APIFree

2025-02-18

Air-gapped networks aren’t foolproof. Stuxnet proved that, and insider threats continue to show their limitations. Meanwhile, HTTPS/TLS provides encrypted, controlled tunnels to trusted services—much like a VPN.

Yet, many still fear “internet connectivity” in security tools like Defender for Endpoint. Let’s rethink what real security means.

Read more in my latest blog post: blog.brianbaldock.net/defender

#CyberSecurity #Encryption #ThreatIntelligence

2025-02-14

“Defender for Endpoint only works when it’s connected to the internet.” I hear this a lot, but it’s misleading. HTTPS/TLS encryption allows for secure, restricted connections—just like a VPN, but at the application layer. If we trust VPNs for security, why dismiss HTTPS/TLS as “open internet”?

It’s time to rethink network security and the myth of "air-gapped" environments. I break it down in my latest post: blog.brianbaldock.net/defender

2025-02-12

Think self-hosting an LLM is hard? Think again.
I used Docker, NGINX, and my RTX 3080 to build a fast, secure AI chatbot.
Check it out: blog.brianbaldock.net/deployin
#AI #LLM #Docker #NGINX #SelfHosted

2025-02-03

Got a gaming PC? Turn it into an AI powerhouse with Docker.
I used my RTX 3080 to run a local AI chatbot—no API calls, no cloud costs.
Learn how I did it: blog.brianbaldock.net/deployin
#AI #SelfHosting #Docker #LLM #Tech

2025-02-01

New blog post: I built a self-hosted AI chatbot powered by vLLM, ChatUI, and Docker—all running on my RTX 3080. I share the full setup, troubleshooting tips, and lessons learned along the way. If you’re into self-hosting, AI, or containerization, this one’s for you.

Read it here: blog.brianbaldock.net/deployin
#AI #SelfHosted #Docker #HomeLab

2024-12-09

🔒 Stop Reacting, Start Preventing 🔒

Cyberattacks don’t wait—why should you?

Join our webinar to learn how Microsoft Defender XDR detects and disrupts multi-stage attacks before damage occurs.

✅ Proactive security with AI-powered tools
✅ Live demos and guided Q&A
✅ Actionable insights for your strategy

📅 Don’t wait for the attack—Register now: msevents.microsoft.com/event?i

2024-12-04

🚨 Cybersecurity at Machine Speed 🚨

Advanced attacks are smarter, but so is your security with Microsoft Defender XDR.

Join our webinar to see how AI-powered tools detect and stop multi-stage attacks across identities, devices, apps, and data—before they cause damage.

✅ Live demos
✅ Guided Q&A
✅ Insights to maximize your investments

📅 Don’t miss it! Register now: msevents.microsoft.com/event?i

Let’s make cybersecurity proactive, not reactive.

2024-12-03

🎉 Big win for security! Universal Continuous Access Evaluation (UCAE) is now in Public Preview (rolling out through Dec 31, 2024). UCAE enables near real-time access policy updates, boosting your Zero Trust strategy. No more waiting for token expiration—compliance changes are enforced instantly! 🔗 Learn more:
🔗 learn.microsoft.com/en-us/entr

The future of real-time security is here, and it’s just so cool. Thoughts? 🤔 #CyberSecurity #ZeroTrust #Microsoft

2024-11-26

MFA isn’t enough. Device compliance stops AiTM attacks by blocking untrusted devices—even if MFA is bypassed. Secure Microsoft 365 the smart way. learn.microsoft.com/en-us/mem/

2024-10-09

🚨 New blog post up! 🚨 I ran into a unique issue while syncing users between Contoso and Fabrikam's multi-tenant setup. Fabrikam's "All Company" group hit its user limit, leading to unexpected behavior. Explore the journey, fixes, and key takeaways! 🔗 blog.brianbaldock.net/fabrikam
#Microsoft365 #CrossTenantSync #Cybersecurity #TechInsights #IT

2024-10-03

With Windows 11 24h2, LSA protection will be automatically enabled if no issues are found. This helps protect your credentials from unauthorized access.

Check or adjust the LSA state in Windows Security > Core Isolation. You can also review logs to see if any programs were blocked from loading into LSA.
learn.microsoft.com/en-us/wind
#CyberSecurity #WindowsUpgrade #LSAProtection

2024-09-13

🚨 Fortinet Confirms Data Breach: 440GB of Data Stolen 🚨

Fortinet confirmed a breach where hackers stole 440GB of sensitive data, including system configurations and VPN credentials. Fortinet users should update firmware, change credentials, implement MFA, and monitor for any signs of compromise.

Full details here: bleepingcomputer.com/news/secu

#CyberSecurity #Fortinet #ZeroTrust #Infosec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst