Digital workplace security for social media generations

Who are social media generations? Social media generations are commonly referred as ‘GenZ’ or ‘iGen’ or ‘Centennials’. The center for generational kinetics define birth years of GenZ as being 1996 to the present. There are currently over 23 million Gen Z in the United States. Within the next five years, they will become the fastest-growing... Continue Reading →

Advertisements

Cyber Security Operations with Humans and Machines

Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should've noticed in market most of the cyber security product vendors using terms such as 'Artificial Intelligence', 'Machine Learning', 'Behavioral Analytics', 'Automated Workflow', etc,. Likewise system integrator, managed security service providers has explored possible use-cases to have 'machine... Continue Reading →

Web Isolation Recommendations and Benefits

Gartner Recommendations Gartner listed the following recommendations for an isolation platform should be able to do. Does not require a local client/agent.Uses an industry-standard web rendering engine that is kept up to date with changes in HTML5.Supports plug-ins, including PDF and Flash.Supports cloud SaaS applications such as Office 365 or G Suite.Provides a remote viewer... Continue Reading →

Stay away from attacks with Web Isolation

What is Web / Browser Isolation The technology essentially is a mini browser environment. It does all the web browsing on behalf of the user and then renders the content back to the end user.   This way the actual user's client browser just sees a rendered screen rather than all the native web content it... Continue Reading →

Part 3 : Zero Trust Network Access (ZTNA)

Zero trust network access is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. In order to achieve this there is no single specific technology is associated with zero... Continue Reading →

Part 2 :Zero Trust Network Access (ZTNA)

Achieve Zero Trust Network Access (ZTNA) in an Enterprise network How to achieve zero trust network access in Internal network The security devices should have the below capabilities to achieve the ZTNA in inside networks. Ensure the network access and user access policies are restricted based on the business needs and only the intended users... Continue Reading →

Part 1 : Zero Trust Network Access (ZTNA)

Overview In a traditional security model assumes that everything on the inside of an organization’s network can be trusted, but given increased attack sophistication and insider threats, new security measures need to be taken to stop them from spreading once inside. Because traditional security models design to protect the perimeter, threats that get inside the... Continue Reading →

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 - EU GDPR - "Notification of a personal data breach to the supervisory authority"; In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data... Continue Reading →

Deepfake – Seeing is no longer believing

What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes exploit this human tendency using generative adversarial networks (GANs), in which two machine learning (ML) models duke it out. One ML model... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: