Cyber Security Defense in Depth Strategies

There is no silver bullet cyber security solution. According to Network Computing, defense in depth is: “The practice of layering defenses to provide added protection. Defense in depth increases security by raising the cost of an attack. This system places multiple barriers between an attacker and your business-critical information resources: The deeper an attacker tries to go, the harder it gets. These multiple layers prevent direct … Continue reading Cyber Security Defense in Depth Strategies

The untold story about ‘bitcoin’ – #cyberattack

Bitcoin is no stranger to controversy. It has weathered various storms over its security. But that is no guarantee that bitcoin will cope well in the future. One of Japan’s largest cryptocurrency exchanges has revealed that it’s lost nearly $400 million in a security breach. Coincheck says that it has restricted deposits and withdrawals for a cryptocurrency called NEM. Marko Kobal, co-founder of NiceHash, the Slovenian startup … Continue reading The untold story about ‘bitcoin’ – #cyberattack

The digital world needs an “immune system.”

Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett is the CEO​ and Co-Founder​ of Chronicle. Stephen joined Chronicle from Google​, … Continue reading The digital world needs an “immune system.”

Transform your ‘Security Operations Center’

CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF 2018 witnessed several cyber security trends and developments including the … Continue reading Transform your ‘Security Operations Center’

Future of Cyber Security with Connected Car Security

The way typical IT organization protects their critical assets with various security technology solutions such as two factor authentication, anti-virus protection, firewalls, intrusion detection systems, DDoS protections and many other technologies. The time has come now to shift the attention to other connected devices that are no more avoidable in everyone’s life Over the past few years, relevant government agencies have also produced reports and … Continue reading Future of Cyber Security with Connected Car Security

Startups at India and Israel will benefit by Cyber Security Partnership

Governments and enterprises are committed to the protection and the integrity of their own proprietary information and the privacy of their citizens and customers; while the hackers are motivated to collect data for different reasons. The acts of data protection and privacy protection that these organization take, using authentication, cloud security, critical infrastructure security, endpoint protection, next generation firewalls, security automation and orchestration, encryption, data … Continue reading Startups at India and Israel will benefit by Cyber Security Partnership

Does Government Prepared To Deal Cyber Security Threat

Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks. Most of the governments have national cyber security strategies drafted in the recent past, but how far its executed it within the government sectors is still a question to authorities to think thru. NATO Cooperative Cyber Defense Center of … Continue reading Does Government Prepared To Deal Cyber Security Threat