Skip to content

future of cybersecurity

Cyber security blog to learn, collaborate and share latest news
  • Home
  • Podcast
  • About
News by Ramesh MJul 1, 20197:05 PMJuly 3, 2019
Read More

Part 1 : Zero Trust Network Access (ZTNA)

Overview In a traditional security model assumes that everything on the inside of an organization’s network can be trusted, but given increased attack sophistication and insider threats, new security measures need to be taken to […]

News by IrfanJul 1, 20199:00 AMJuly 1, 2019
Read More

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 – EU GDPR – “Notification of a personal data breach to the supervisory authority”; In the case of a personal data breach, the controller shall without […]

News by IrfanJun 26, 20198:24 AM
Read More

Deepfake – Seeing is no longer believing

What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes […]

News by IrfanJun 1, 20195:36 PMJune 28, 2019
Read More

Threat modeling frameworks and methodologies

Threat modeling is a process by which organizations can shift their security approach from reactively plugging exploits to proactively and systematically understanding and addressing potential threats in the design stage. This process identifies potential threats […]

IoT by IrfanMay 14, 201910:31 PMMay 15, 2019
Read More

Unpatched vulnerabilities; Is it problem worth solving?

Enterprise today are investing in world class security products and do hire talented workforce to keep their business assets safe from any attack vectors. According to IBM XForce Threat Intelligence Index 2019, the growing attack […]

Cyber Security by IrfanApr 10, 20199:13 PMApril 11, 2019
Read More

Application visibility is key for data center micro segmentation

Micro segmentation is key for zero-trust network Micro segmentation divides a network at a granular level, allowing organizations to tailor security settings to different types of traffic and create policies that limit network and application […]

Cyber Security by IrfanApr 4, 20195:51 PMApril 4, 2019
Read More

Importance of security operational metrics and reports

Enterprise today has limited security resources and are strive to ensure the confidentiality, availability and integrity of data. The cost of securing operational assets and data is an important consideration. Each enterprise must find ways […]

News by IrfanMar 31, 20198:00 PMNovember 17, 2020
Read More

Cyber Threat Intelligence Sources

On Feb 12, 2015, US president sign an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government. Rapid information sharing is an […]

Cyber Security by IrfanMar 26, 201910:30 AMMarch 29, 2019
Read More

Revolutionary threat hunting platform for massive data

A global platform for analyzing enterprise security telemetry Enterprises today has security systems in place, often including network security devices such as firewalls, SIEMs, IDS, secure web gateways, network anomaly behavior, deception, packet capture, and […]

News by IrfanMar 3, 20195:00 PMApril 5, 2019
Read More

Multi Cloud Security Technology Requirements

Its multi cloud world According to IDC CloudView; 85% of enterprise evaluating or using public cloud, 87% of them taken steps towards a hybrid cloud strategy and 94% of than have plan to use multiple […]

Posts navigation

Previous 1 2 3 4 5 6 … 21 Next
Start a Blog at WordPress.com.

Begin typing your search above and press return to search. Press Esc to cancel.

  • Follow Following
    • future of cybersecurity
    • Join 901 other followers
    • Already have a WordPress.com account? Log in now.
    • future of cybersecurity
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...