11 STEPS FOR ALIGNING YOUR BC/DR PROGRAM WITH BUSINESS NEEDS Disaster recovery wouldn’t be complex if organizations could adopt a “one size fits all” approach…
Usage of proper SIEM Use Cases is critical in setting up the security operations center (SOC) operations. A use case can consist of multiple technical…
Introduction Today, with advanced technology, there has been an increase in the number of cyber threats. Social engineering has become one of the most common…
Sophos received a report on April 22, 2020, at 20:29 UTC regarding an XG Firewall with a suspicious field value visible in the management interface.…
Stay Healthy, Stay Secure : Work From Home Cybersecurity Tips Depending where in the world you live, you are either already working remote, getting ready…
Setting up a Zero Cost Threat Hunting Platform with Elastic Stack and Alienvault Reputation List Elastic Stack is an awesome suit of products used for…
No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management system 154 Unrestricted use of system…
Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate change control 3 Inadequate network…
Useful KPIs for a Security Operation Center (SOC) No KPI 1 The percentage of phishing emails opened by your end-users 2 Phishing emails informed by…