Threat modeling frameworks and methodologies


Threat modeling is a process by which organizations can shift their security approach from reactively plugging exploits to proactively and systematically understanding and addressing potential threats in the design stage. This process identifies potential threats to the system, data/asset exposure, logical/architectural vulnerabilities, and relevant security controls to help evaluate security decisions, serve as a guide... Continue Reading →

Advertisements

Unpatched vulnerabilities; Is it problem worth solving?


Enterprise today are investing in world class security products and do hire talented workforce to keep their business assets safe from any attack vectors. According to IBM XForce Threat Intelligence Index 2019, the growing attack surface and rising risk in organization today are vulnerability remediation and effective patch management. Security leaders wanting their security operations... Continue Reading →

Cyber Threat Intelligence Sources


On Feb 12, 2015, US president sign an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government. Rapid information sharing is an essential element of effective cybersecurity, because it enables companies to work together to respond to threats, rather than operating alone.... Continue Reading →

Revolutionary threat hunting platform for massive data


A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

Multi Cloud Security Technology Requirements


https://www.slideshare.net/RasoolKareemIrfan/multi-cloud-security-technology-requirements Its multi cloud world According to IDC CloudView; 85% of enterprise evaluating or using public cloud, 87% of them taken steps towards a hybrid cloud strategy and 94% of than have plan to use multiple clouds. Based on the public cloud market research ( Gartner : ID G00336148) Gartner predicts IaaS spending in public... Continue Reading →

Cyber kill chain is dead


cyber kill chain vs MITRE

Blog at WordPress.com.

Up ↑

%d bloggers like this: