Part 3 : Zero Trust Network Access (ZTNA)

Zero trust network access is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. In order to achieve this there is no single specific technology is associated with zero... Continue Reading →

Deepfake – Seeing is no longer believing

What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes exploit this human tendency using generative adversarial networks (GANs), in which two machine learning (ML) models duke it out. One ML model... Continue Reading →

Revolutionary threat hunting platform for massive data

A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

The digital world needs an “immune system.”

Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett... Continue Reading →

Transform your ‘Security Operations Center’

CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF... Continue Reading →

Securing Container workloads for Enterprise

What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and... Continue Reading →

Open Source Hardware – its Cost Reduction for many enterprise business

Large enterprise, cloud service providers, 'big brand' product companies are spending millions or billions of dollars in building their data center. So what do you think keeping these companies technology imperatives moving forward. Are they going to focus on hybrid controllers, traffic shaping, 100G, network modeling, network analytics and simulation, circuit automation and testing, backbone... Continue Reading →

Does Artificial Intelligence (AI) solve shortage of Cyber Security professionals

Worldwide Revenue for Security Technology Forecast to Surpass $100 Billion in 2020, According to the New IDC Worldwide Semiannual Security Spending Guide. The industries that will see the fastest growth in their security investments will be healthcare (10.3% CAGR), followed by telecommunications, utilities, state/local government, and securities and investment services. "The pace and threat of security... Continue Reading →

Blog at WordPress.com.

Up ↑