<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Jeremiah Windle</title><link>https://7f57629a.jeremiahwindle.pages.dev/categories/security/</link><description>Recent content in Security on Jeremiah Windle</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 18 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://7f57629a.jeremiahwindle.pages.dev/categories/security/index.xml" rel="self" type="application/rss+xml"/><item><title>SIEM Platforms Compared: Kibana vs Perch vs Splunk From an MSP Seat</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/siem-platforms-compared/</link><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/siem-platforms-compared/</guid><description>Most SIEM comparisons are written by vendors or analysts who&amp;rsquo;ve seen the demos. This one is written by someone who&amp;rsquo;s used these platforms in production — ingesting real logs, tuning real alerts, and investigating real incidents across dozens of client environments. Here&amp;rsquo;s what actually matters.
The Three Platforms I&amp;rsquo;ve had meaningful production time with:
Kibana (ELK Stack) — primary SIEM at my current MSP for security operations across municipal government clients Perch Security — co-managed SIEM platform purpose-built for MSPs, used across 40+ client organizations Splunk — exposure through client environments and hands-on study; included here for completeness against the standard that everyone measures against Kibana (ELK Stack) Kibana is the visualization layer on top of Elasticsearch and Logstash — the &amp;ldquo;K&amp;rdquo; in ELK.</description></item><item><title>Entra ID Conditional Access: Real Policies, Real Scenarios, What to Actually Enforce</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/conditional-access-policies/</link><pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/conditional-access-policies/</guid><description>Conditional Access is one of those features where the gap between &amp;ldquo;we have it enabled&amp;rdquo; and &amp;ldquo;we have it configured correctly&amp;rdquo; is wide enough that attackers drive through it regularly. I&amp;rsquo;ve managed CA policies across 100+ organizations at two MSPs. Here&amp;rsquo;s the framework I&amp;rsquo;ve landed on.
The Foundation: What CA Actually Is Conditional Access is Entra ID&amp;rsquo;s policy engine. Every sign-in attempt hits it, and the policy evaluates conditions — who is signing in, from where, on what device, to what application — and makes a decision: allow, block, or allow with requirements (MFA, compliant device, etc.</description></item></channel></rss>