Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Tag: Information security

Information Security Vulnerability List – 2

by Sumesh MSPosted onDecember 21, 2019

No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management system 154 Unrestricted use of system…

Read More

Information Security Vulnerability List – 1

by Sumesh MSPosted onDecember 21, 2019December 21, 2019

Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate change control 3 Inadequate network…

Read More

Data Protection

by Upen PatelPosted onMay 9, 2018May 9, 2018

Some of the basic question you should ask about data protection How information is governed at your business? Do you classify your data, identifying sensitive…

Read More

Information Security Framework Implementation Benefits

by Sumesh MSPosted onApril 15, 2018April 21, 2018

An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security and risk management programs and…

Read More

10 steps to Cyber Security

by Sumesh MSPosted onApril 12, 2018April 21, 2018

The actions and steps described below are in accordance with the guidelines from CESG UK and represent a good foundation for effective information risk management…

Read More

Endpoint Security and Endpoint Management

by Upen PatelPosted onApril 10, 2018April 24, 2018

TANIUM CORE (Endpoint Security and Endpoint Management ) Ask Know Act  The platform for manageability and security The best endpoint solution in the market today…

Read More

Risk Assessment

by Upen PatelPosted onMarch 21, 2018April 24, 2018

Risk assessment is a key component of holistic, organization-wide risk management process. Risk Management Processes include: Framing Risk Assessing risk Responding to risk Monitoring risk.…

Read More

Importance of Metrics in an IT Security Program

by Sumesh MSPosted onMarch 15, 2018April 24, 2018

Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decision making and evaluating accountability in…

Read More
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress