The focus of corporate cyber security risks are now being shifted from prevention to enhance detection and incident response readiness – as you can’t stop attacks. Many organizations are still struggling to combat cyber risk […]

The focus of corporate cyber security risks are now being shifted from prevention to enhance detection and incident response readiness – as you can’t stop attacks. Many organizations are still struggling to combat cyber risk […]
Effective from Nov 2020, customer using Microsoft operating systems and Edge Chromium browsers can avail endpoint data loss prevention (DLP) capabilities with Microsoft Endpoint DLP solutions. In my recent blog titled ”ENTERPRISE CAN’T PROTECT THREATS, […]
Organizations exploring options to reduce the cost of IT security investments while maintaining the confidentiality, integrity and availability of IT resources. Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize […]
In this digital era, organizations do have world-class cyber security tools and certified experienced professionals to manage the technology to safeguard from any data breaches. Despite having adequate security controls and enforcement of IT security […]
Evolution of the CISO The role for CISO has evolved in last two decades, In early year 2000 – organizations require security information officer to focus on regulatory compliance and interaction with external auditors and […]
Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial infection, […]
If you are in process of buying a car – probably you’ll do self research, visit the showrooms, opt for self-drive, experience it and then make decision – whether or not to buy the product […]
Who are social media generations? Social media generations are commonly referred as ‘GenZ’ or ‘iGen’ or ‘Centennials’. The center for generational kinetics define birth years of GenZ as being 1996 to the present. There are […]
Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should’ve noticed in market most of the cyber security product vendors using terms such as ‘Artificial Intelligence’, ‘Machine […]
Gartner Recommendations Gartner listed the following recommendations for an isolation platform should be able to do. Does not require a local client/agent. Uses an industry-standard web rendering engine that is kept up to date with […]