Gartner defines ‘Threat Hunting’ as “an analyst-centric process that enables organizations to uncover threats missed by automated preventative and detective controls”. Its security analyst centric versus technology centric. Organization invested heavily on market leading security […]
Category: Indicator of Compromise
Cyber security table top exercise – Just do it.
The focus of corporate cyber security risks are now being shifted from prevention to enhance detection and incident response readiness – as you can’t stop attacks. Many organizations are still struggling to combat cyber risk […]
People is the most critical vulnerability in any organization
In this digital era, organizations do have world-class cyber security tools and certified experienced professionals to manage the technology to safeguard from any data breaches. Despite having adequate security controls and enforcement of IT security […]
Decryption tool for the Maze ransomware
Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial infection, […]