Michael Adjei
Michael Adjei is an experienced cybersecurity professional who helps organizations utilize cybersecurity as an enabler for business. With decades of experience, Michael’s expertise has been exercised across various roles with proficiency in Technical Sales Engineering, Professional Training, Professional Services, Mentoring, C-level advisory and Team Management spanning Europe, Middle East and Africa (EMEA). Michael is currently the Director, Systems Engineering, EMEA at Illumio.
Authored content
Should We Worry About Cybersecurity Becoming Too Dependent on AI?
Get insight into why AI is a boon for cybersecurity despite its weaknesses and how combining the power of AI with the human intellect can alleviate fears about AI overreliance.
A Security Practitioner’s Framework for AI Safety and Security
Get an actionable framework on AI safety that a security expert had hoped to come out of the recent AI Safety Summit 2023.
Demystifying Ransomware Techniques Using .Net Assemblies: A Multi-Stage Attack
Learn the fundamentals of a multi-stage payload attack using a set of staged payloads.
Demystifying Ransomware Techniques Using .Net Assemblies: EXE vs. DLL Assemblies
Learn the key differences between .Net assemblies (EXE vs. DLL) and how they are executed on an initial high-level code.
Assume Breach with Zero Trust Endpoint Security
Learn why traditional approaches to endpoint security aren't enough and how Illumio Endpoint can complement your existing detection tools.
Demystifying Ransomware Techniques Using .Net Assemblies: 5 Main Techniques
Learn about 5 ransomware techniques using the .Net software framework.
Malware Payloads & Beacons: Techniques to Mitigate Impact
In the final part of this series, we focus on some of the obfuscation techniques used to disguise malware payloads and examine mitigation techniques organizations can employ.
Malware Payloads & Beacons: Types of Malicious Payloads
Understanding distinct types of payloads and reviewing an example of malicious code they may employ.
Malware Payloads & Beacons: How Malicious Communications Start
Malware beacons are how an attacker can execute malware through a script. Recognizing them helps develop detection and containment strategies.
Take Me to Your Domain Controller: Protections & Mitigations Using Zero Trust Tools
In part 1 of this blog series, we looked at how discovery methods can be used in an initial compromise.
Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment
In the first part of this blog series, we saw different ways a threat actor can carry out the Discovery phase of the ATT&CK framework to gain a lay of the land after an initial infection.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?