Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should’ve noticed in market most of the cyber security product vendors using terms such as ‘Artificial Intelligence’, ‘Machine […]

Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should’ve noticed in market most of the cyber security product vendors using terms such as ‘Artificial Intelligence’, ‘Machine […]
What is Web / Browser Isolation The technology essentially is a mini browser environment. It does all the web browsing on behalf of the user and then renders the content back to the end user. […]
What regulators demanding from organizations? According to Article 33 – EU GDPR – “Notification of a personal data breach to the supervisory authority”; In the case of a personal data breach, the controller shall without […]
Enterprise today are investing in world class security products and do hire talented workforce to keep their business assets safe from any attack vectors. According to IBM XForce Threat Intelligence Index 2019, the growing attack […]
Enterprise today has limited security resources and are strive to ensure the confidentiality, availability and integrity of data. The cost of securing operational assets and data is an important consideration. Each enterprise must find ways […]
A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and […]
In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM, etc.) and the prioritize in building the SOC provides security and the CIA was maintained. However, later the emerge of the attacks and the […]
cyber kill chain vs MITRE