Part 3 : Zero Trust Network Access (ZTNA)


Zero trust network access is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. In order to achieve this there is no single specific technology is associated with zero... Continue Reading →

Advertisements

Part 2 :Zero Trust Network Access (ZTNA)


Achieve Zero Trust Network Access (ZTNA) in an Enterprise network How to achieve zero trust network access in Internal network The security devices should have the below capabilities to achieve the ZTNA in inside networks. Ensure the network access and user access policies are restricted based on the business needs and only the intended users... Continue Reading →

Part 1 : Zero Trust Network Access (ZTNA)


Overview In a traditional security model assumes that everything on the inside of an organization’s network can be trusted, but given increased attack sophistication and insider threats, new security measures need to be taken to stop them from spreading once inside. Because traditional security models design to protect the perimeter, threats that get inside the... Continue Reading →

Deepfake – Seeing is no longer believing


What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes exploit this human tendency using generative adversarial networks (GANs), in which two machine learning (ML) models duke it out. One ML model... Continue Reading →

Revolutionary threat hunting platform for massive data


A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

Modern CyberSOC – Brief and Implementation Strategy on building a Collaborative Cyber Security Infrastructure


In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM, etc.) and the prioritize in building the SOC provides security and the CIA was maintained. However, later the emerge of the attacks and the threat actors becomes more challenge and the existing SOC will not able to provide better security over the CIA. There... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: