Part 3 : Zero Trust Network Access (ZTNA)

Zero trust network access is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. In order to achieve this there is no single specific technology is associated with zero... Continue Reading →

Revolutionary threat hunting platform for massive data

A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and endpoint security devices such as EDR technologies, email security, encryption technologies, etc.. Together, these solutions generate massive amount of telemetry... Continue Reading →

Cyber kill chain is dead

cyber kill chain vs MITRE

The digital world needs an “immune system.”

Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett... Continue Reading →

Transform your ‘Security Operations Center’

CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF... Continue Reading →

Securing Container workloads for Enterprise

What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and... Continue Reading →

India to attract investment USD 100 billion in communication sector

India is the world's second-largest telecommunications market, with over 1.2 billion subscribers as of September 2017. Availability of affordable smartphones and lower rates are expected to drive growth in the Indian telecom industry. With 70 per cent of the population staying in rural areas, the rural market would be a key growth driver in the coming... Continue Reading →

Does Government Prepared To Deal Cyber Security Threat

Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks. Most of the governments have national cyber security strategies drafted in the recent past, but how far its executed it within the government sectors is still a question to... Continue Reading →

How Tata can regain the telecom market in India

India Telecommunication market has huge potential due to various factors With a subscriber base of nearly 1,210.71 million, as of July 2017, India accounted for the 2nd largest telecom network in the world. With 431.21 million internet subscriber, as of June 2017, India stands 2nd highest in terms of total internet users Mobile based Internet... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: