Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Category: Information Security

11 Steps For Aligning Your BC/DR Program With Business Needs

by Sumesh MSPosted onAugust 24, 2021August 24, 2021

11 STEPS FOR ALIGNING YOUR BC/DR PROGRAM WITH BUSINESS NEEDS Disaster recovery wouldn’t be complex if organizations could adopt a “one size fits all” approach…

Read More

SIEM Use Cases

by Sumesh MSPosted onAugust 23, 2021

Usage of proper SIEM Use Cases is critical in setting up the security operations center (SOC) operations. A use case can consist of multiple technical…

Read More

Awareness on Social Engineering for General Public

by Rucha AgrePosted onApril 28, 2020April 28, 2020

Introduction Today, with advanced technology, there has been an increase in the number of cyber threats. Social engineering has become one of the most common…

Read More

SQL injection vulnerability and malicious code execution in XG Firewall/SFOS

by Sumesh MSPosted onApril 26, 2020

Sophos received a report on April 22, 2020, at 20:29 UTC regarding an XG Firewall with a suspicious field value visible in the management interface.…

Read More

Stay Healthy, Stay Secure : Work From Home Cybersecurity Tips

by Sumesh MSPosted onMarch 22, 2020

Stay Healthy, Stay Secure : Work From Home Cybersecurity Tips Depending where in the world you live, you are either already working remote, getting ready…

Read More

Zero-Cost Threat Hunting with Elastic Stack

by Sumesh MSPosted onJanuary 16, 2020January 16, 2020

Setting up a Zero Cost Threat Hunting Platform with Elastic Stack and Alienvault Reputation List Elastic Stack is an awesome suit of products used for…

Read More

Information Security Vulnerability List – 2

by Sumesh MSPosted onDecember 21, 2019

No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management system 154 Unrestricted use of system…

Read More

Information Security Vulnerability List – 1

by Sumesh MSPosted onDecember 21, 2019December 21, 2019

Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate change control 3 Inadequate network…

Read More

Useful KPIs for a Security Operation Center (SOC)

by Sumesh MSPosted onDecember 19, 2019December 19, 2019

Useful KPIs for a Security Operation Center (SOC) No KPI 1 The percentage of phishing emails opened by your end-users 2 Phishing emails informed by…

Read More

Posts pagination

Page 1 Page 2 Page 3 Next Page
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress