Return on Investment (ROI) in cybersecurity investments is essential for justifying expenditures, reducing risks, ensuring compliance, protecting reputation, and making inf… Read More
We recently had a chance to talk to Mathan Babu Kasilingham, Chief Technology Security Officer & Data Privacy Officer at Vodafone Idea Limited. Vi, as the company is kn… Read More
Google vulnerability scanners are best known for finding vulnerabilities in your App Engine, Google Kubernetes Engine (GKE), and Compute Engine web apps.
Sophisticated threats aimed at yo… Read More
The use of Artificial intelligence (AI) is an absolute game-changer in cybersecurity. Going beyond the hype and silver bullets offered by XDR and SOAR, AI is a major step f… Read More
Reading Time: 7 minutes
If you’re reading this, you might be considering a cloud security solution – maybe an identity and permissions-focused one – maybe even Sonrai… Read More
In this blog we detail the evolution of Next-Gen SIEM. Traditional SIEMs have primarily been used to improve network visibility and cyber security while supporting complian… Read More
In today’s digital age, security threats are becoming increasingly sophisticated and hard to detect. Traditional security measures are no longer enough to keep businesses and organ… Read More
Enables enterprises to operationalize MITRE ATT&CK and build a multi-layered, threat-informed defense to eliminate gaps based on organizational risk and priorities
CardinalOps, the de… Read More
Introductions
An infrastructure has been built, a patching plan has been developed, firewalls have been locked down and monitored, assets are being managed, and the security operations cente… Read More
Operationalize in Seconds is the first in a series of blog posts focused on what is required to gain the maximum efficiency from your SIEM for the purposes of Threat Detection, Investigation… Read More
For most current SIEMs, their primary function is to collect and ingest data, primarily logs, across the entire network. While the core function and deployment of the SIEM has been for loggi… Read More
“While 2021 can also be defined as the year of the big sprint, consuming a lot of resources to move ahead at maximum pace, 2022 is the year of the big cool down resulting in an adju… Read More
Cybersecurity technology, like the online world itself, is a constantly evolving entity. In just one year alone, it can be hard to keep track of all the new threats and technologies that ha… Read More
FCA examining big tech disruption of financial services Warnings of financial services sector competition being harmed have been expressed by the UK regulator, as Amazon, Apple, Google a… Read More
Securonix, has announced that it participated in Snowflake’s Data Cloud World Tour in Mumbai & Bengaluru on the 21st & 28th of September respectively to showcase the latest cap… Read More
I can probably tell you right now whether or not you’re very likely to suffer a ransomware attack this year, just by taking a peek at the current tools in your stack. You know what I&r… Read More
As information technology (IT) migrates to hybrid environments, which include both on-premises and cloud services, traditional perimeter-based security is becoming outdated. Zero trust… Read More
SD-WAN and Cybersecurity: Two Sides of the Same CoinSD-WAN is a natural extension of NGFWs that can leverage these devices’ content/context awareness and deep packet inspection. The… Read More
One of the biggest mainstays of an enterprise-level security program is a Security Information and Event Management (SIEM) tool. Just as a quick overview, a SIEM collects and aggregates log… Read More
Security information and event management (SIEM) technologies have long been powerful tools for cyber security professionals. They enable security teams to gather and analyse event-based da… Read More
Solving the security challenges of public cloudCompounding matters is the lack of a unified framework for dealing with public cloud security. End users and cloud consumers are forced to de… Read More
Usability Testing: the Ultimate Guide [Free Checklist]Generally speaking, usability testing comes in two types: moderated and unmoderated. Moderated sessions are guided by a researcher or… Read More
Future in Fintech in 2020: a revolution in financial sectors Experts foresight 2020 to bring a tremendous change in the future of the Fintech industry. Goldman Sachs predicts that by th… Read More
How Big Data Velocity Informs Population Health, Patient Safety“You may have a patient surveillance system that requires really large datasets to monitor their vitals and maybe do some… Read More
Today’s advanced technologies, including AI and machine learning, are bringing about a cybersecurity landscape in which organizations are far more protected than w… Read More