Alibaba Cloud – 11 layer security architecture


A major challenge for organizations is the increasing number of security threats and the rise of their complexity. The inter connectivity of devices over the Internet, both through IoT and mobility, makes it impossible for organizations to monitor and secure all devices. Cyber criminals have also become more sophisticated, with many online tools available for them to execute attacks. The capability gap between organizational security … Continue reading Alibaba Cloud – 11 layer security architecture

Threat Hunting = Use humans to find stuff


Organizations realize that cyber security investments are not avoidable in digital economy and has leading security technologies to identify, protect, detect, respond and recover from various attack vectors. But, Can they sit and relax for tools and technologies to alert them? If yes, why companies waiting an average of 220 days between the intrusion and the first time to hear about it. Here comes the … Continue reading Threat Hunting = Use humans to find stuff