Decryption tool for the Maze ransomware

Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial infection, the ransomware attempts to spread to shared storage drives and other accessible systems. If the demands are not met, the... Continue Reading →

Enhance your SOC with Microsoft Security Graph Integration

The Microsoft Graph Security API simplifies integration with Microsoft and third-party security solutions. Using one endpoint, one software development kit (SDK), one schema, and one authentication mechanism, you can easily build integrated security applications, workflows, and analytics. Microsoft Graph is a collection of APIs that together provide a standard unified interface and schema for accessing... Continue Reading →

Cyber Security Operations with Humans and Machines

Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should've noticed in market most of the cyber security product vendors using terms such as 'Artificial Intelligence', 'Machine Learning', 'Behavioral Analytics', 'Automated Workflow', etc,. Likewise system integrator, managed security service providers has explored possible use-cases to have 'machine... Continue Reading →

Stay away from attacks with Web Isolation

What is Web / Browser Isolation The technology essentially is a mini browser environment. It does all the web browsing on behalf of the user and then renders the content back to the end user.   This way the actual user's client browser just sees a rendered screen rather than all the native web content it... Continue Reading →

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 - EU GDPR - "Notification of a personal data breach to the supervisory authority"; In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data... Continue Reading →

Unpatched vulnerabilities; Is it problem worth solving?

Enterprise today are investing in world class security products and do hire talented workforce to keep their business assets safe from any attack vectors. According to IBM XForce Threat Intelligence Index 2019, the growing attack surface and rising risk in organization today are vulnerability remediation and effective patch management. Security leaders wanting their security operations... Continue Reading →

Importance of security operational metrics and reports

Enterprise today has limited security resources and are strive to ensure the confidentiality, availability and integrity of data. The cost of securing operational assets and data is an important consideration. Each enterprise must find ways to balance between managing risk and cyber security expenditures. Role of measurements and metrics in security operation center Measurements tend... Continue Reading →

Blog at WordPress.com.

Up ↑