Application visibility is key for data center micro segmentation


Micro segmentation is key for zero-trust network Micro segmentation divides a network at a granular level, allowing organizations to tailor security settings to different types of traffic and create policies that limit network and application flows to those that are explicitly permitted. It allows security teams the flexibility to apply the right level of protection... Continue Reading →

Advertisements

Importance of security operational metrics and reports


Enterprise today has limited security resources and are strive to ensure the confidentiality, availability and integrity of data. The cost of securing operational assets and data is an important consideration. Each enterprise must find ways to balance between managing risk and cyber security expenditures. Role of measurements and metrics in security operation center Measurements tend... Continue Reading →

Cyber Threat Intelligence Sources


On Feb 12, 2015, US president sign an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government. Rapid information sharing is an essential element of effective cybersecurity, because it enables companies to work together to respond to threats, rather than operating alone.... Continue Reading →

Revolutionary threat hunting platform for massive data


A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

Modern CyberSOC – Brief and Implementation Strategy on building a Collaborative Cyber Security Infrastructure


In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM, etc.) and the prioritize in building the SOC provides security and the CIA was maintained. However, later the emerge of the attacks and the threat actors becomes more challenge and the existing SOC will not able to provide better security over the CIA. There... Continue Reading →

Cyber kill chain is dead


cyber kill chain vs MITRE

Blog at WordPress.com.

Up ↑

%d bloggers like this: