Part 1 : Zero Trust Network Access (ZTNA)

Overview In a traditional security model assumes that everything on the inside of an organization’s network can be trusted, but given increased attack sophistication and insider threats, new security measures need to be taken to stop them from spreading once inside. Because traditional security models design to protect the perimeter, threats that get inside the... Continue Reading →

Unpatched vulnerabilities; Is it problem worth solving?

Enterprise today are investing in world class security products and do hire talented workforce to keep their business assets safe from any attack vectors. According to IBM XForce Threat Intelligence Index 2019, the growing attack surface and rising risk in organization today are vulnerability remediation and effective patch management. Security leaders wanting their security operations... Continue Reading →

Importance of security operational metrics and reports

Enterprise today has limited security resources and are strive to ensure the confidentiality, availability and integrity of data. The cost of securing operational assets and data is an important consideration. Each enterprise must find ways to balance between managing risk and cyber security expenditures. Role of measurements and metrics in security operation center Measurements tend... Continue Reading →

Cyber Threat Intelligence Sources

On Feb 12, 2015, US president sign an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government. Rapid information sharing is an essential element of effective cybersecurity, because it enables companies to work together to respond to threats, rather than operating alone.... Continue Reading →

Blog at WordPress.com.

Up ↑