Skip to content

future of cybersecurity

Cyber security blog to learn, collaborate and share latest news
  • Home
  • Podcast
  • About
Cyber Security by IrfanOct 21, 20196:00 PMOctober 19, 2019
Read More

Digital workplace security for social media generations

Who are social media generations? Social media generations are commonly referred as ‘GenZ’ or ‘iGen’ or ‘Centennials’. The center for generational kinetics define birth years of GenZ as being 1996 to the present. There are […]

News by IrfanOct 1, 201911:06 PM
Read More

Cyber Security Operations with Humans and Machines

Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should’ve noticed in market most of the cyber security product vendors using terms such as ‘Artificial Intelligence’, ‘Machine […]

News by Ramesh MJul 12, 20191:40 PMJuly 19, 2019
Read More

Web Isolation Recommendations and Benefits

Gartner Recommendations Gartner listed the following recommendations for an isolation platform should be able to do. Does not require a local client/agent. Uses an industry-standard web rendering engine that is kept up to date with […]

News by Ramesh MJul 9, 20192:19 PMJuly 10, 2019
Read More

Stay away from attacks with Web Isolation

What is Web / Browser Isolation The technology essentially is a mini browser environment. It does all the web browsing on behalf of the user and then renders the content back to the end user.   […]

News by Ramesh MJul 6, 20198:57 AMJuly 6, 2019
Read More

Part 3 : Zero Trust Network Access (ZTNA)

Zero trust network access is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or […]

News by Ramesh MJul 2, 20192:05 PMJuly 2, 2019
Read More

Part 2 :Zero Trust Network Access (ZTNA)

Achieve Zero Trust Network Access (ZTNA) in an Enterprise network How to achieve zero trust network access in Internal network The security devices should have the below capabilities to achieve the ZTNA in inside networks. […]

News by Ramesh MJul 1, 20197:05 PMJuly 3, 2019
Read More

Part 1 : Zero Trust Network Access (ZTNA)

Overview In a traditional security model assumes that everything on the inside of an organization’s network can be trusted, but given increased attack sophistication and insider threats, new security measures need to be taken to […]

News by IrfanJul 1, 20199:00 AMJuly 1, 2019
Read More

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 – EU GDPR – “Notification of a personal data breach to the supervisory authority”; In the case of a personal data breach, the controller shall without […]

News by IrfanJun 26, 20198:24 AM
Read More

Deepfake – Seeing is no longer believing

What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes […]

News by IrfanJun 1, 20195:36 PMJune 28, 2019
Read More

Threat modeling frameworks and methodologies

Threat modeling is a process by which organizations can shift their security approach from reactively plugging exploits to proactively and systematically understanding and addressing potential threats in the design stage. This process identifies potential threats […]

Posts navigation

Previous 1 2 3 4 5 … 20 Next
Start a Blog at WordPress.com.

Begin typing your search above and press return to search. Press Esc to cancel.

Cancel

 
Loading Comments...
Comment
    ×