Tuesday, 31 March 2020

Is Cyber Incident Response better than Risk Insurance?

Cyberattacks are continuously evolving. They are rising exponentially and affecting businesses and users as never before. From the network infrastructure to sensitive data and applications, nothing is safe from the reach of cybercriminals. Large corporations, government agencies, as well as SMEs are struggling to protect their critical infrastructure...

Sunday, 29 March 2020

Is Your Data Secure Online?

All business, large or small, face the problem of secure data storage, at regular intervals of time. There are options when choosing the best place to store all the sensitive date that a company creates, (personal or financial data of clients or HR data of employees), but which...

Saturday, 28 March 2020

5 SOC and SIEM Tools that go hand-in-hand

In 2019, 93% of all malicious Windows executables were found polymorphic, following the previous year’s trend; Polymorphism is a tactic designed to avoid traditional antimalware detection. To this end, businesses are under constant threat of being exploited by ransomware, phishing, denial-of-service, and other forms of attacks. Since the...

Thursday, 26 March 2020

5 Crucial Elements that Every Cyber Disaster Recovery Plan Must Have

We’ve all heard the stories of businesses collapsing after hit by an unforeseen event. The primary cause behind this fall is usually the longer cut off from the regular business operations. Interestingly, the ill-effects of a disaster or security incident can completely be avoided with a strategic cyber...

Tuesday, 24 March 2020

All you need to know about Memory Forensics – Identifying potential volatile data

In the case of digital forensic, data present in the digital assets serves as strong evidence. The systems’ memory may have critical data of attacks, like account credentials, encryption keys, messages, emails, non-cacheable internet history, network connections, endpoint connected devices, etc. Memory forensics provides insights into network connections,...

Sunday, 22 March 2020

Cybersecurity and coronavirus: keeping your business safe

As governments and businesses work on mitigating the impact of the ongoing COVID-19 outbreak, social distancing measures are leading to an increase in remote working across all sectors. The reasoning behind the measures is best left to health authorities, and are discussed at length elsewhere. The purpose of...

Saturday, 21 March 2020

2-step remedy to a Cloud Sprawl

The increasing cloud adoption by businesses has also led to the rise in the risk of cloud sprawl, resulting in a large number of cloud security threats. The enterprises rush to capitalize on efficiency, flexibility, and scalability with the help of cloud technology. An Enterprise Strategy Group performed...

Thursday, 19 March 2020

4 Cybersecurity Challenges affecting Business Continuity since the Coronavirus Outbreak

With the rise of coronavirus (COVID-19), businesses around the world are facing major disruptions. They are struggling to continue business operations and secure their corporate assets. At the same time, employees are combating a tough fight against the virus itself. To make things worse, cybercriminals are riding on...

Tuesday, 17 March 2020

5-Step process to power your Cyber Defense with Cyber Threat Intelligence

With more connected systems and devices performing more individual tasks today, it’s imperative to keep them up and running and protected. This requires not just traditional security but cyber threat intelligence. Cyber intelligence has been around for quite a few years, with it being called many different things....

Saturday, 14 March 2020

Cybersecurity Trends in 2020 & the Threats Facing the Industry

2019 saw cybersecurity as a massive issue, both for the technology industry and the general public. Between ransomware attacks, credit card fraud, and a tsunami wave of new app releases (some of them with little to no security measure in place), cybersecurity has never been more important for...

Thursday, 12 March 2020

5 Steps to building an Incident Response Plan for a Large Organization

Large organizations are encountered continuously by questions like, “Will the data collected be safe?”, “What happens if a breach occurs?”, “What information did they gain access to?”, “Do we have the right skill/plan to protect the organization from being infiltrated?” It is because of these questions that large...

Sunday, 8 March 2020

5 Reasons Why Your Threat Intelligence Strategy Will Fail and How You Can Salvage It

A well-established cybersecurity team is equipped with the latest tools, valuable experience of infosec professionals, a dedicated budget, and plenty of data from threat intelligence sources. Is this not enough for a team to give excellent performance and stay untouched by emerging threats? Perhaps not if you are...

Saturday, 7 March 2020

Threat Data Vs. Threat Intelligence

A comprehensive security program focuses on individual goals along with the understanding of processes that makes data useful intelligence. ‘Threat Intelligence’ has become a special buzzword in today’s cybersecurity landscape. However, not many people know what it truly means. The word ‘threat intelligence’ is often misused with ‘threat...

Pages (26)1234567 »