Published inAWS TipKnock Knock! Never mind.. Backdoor is open!Businesses are increasingly expanding workloads to the cloud. Cloud Service Providers invest a lot to provide enhanced security to build…Mar 19, 2021Mar 19, 2021
Security Operations : 6 key capabilities to consider in choosing an orchestration platformFeb 18, 2021Feb 18, 2021
Security Operations : Finding needle in the haystackPart 1: Challenges of Security Operations Center and options to ExploreFeb 4, 2021Feb 4, 2021
Avoid the Click Bait: Secure your Email from Ransomware & Spear Phishing AttacksExciting new technological innovations are changing our lifestyle everyday, and so are the new types of cyber threats making us more…Sep 5, 2017Sep 5, 2017
Avoid Security Alert Fatigue: Simplify and Accelerate Your Incident ResponseAn FBI report released last year estimated 327,374 robberies nationwide, which accounted for an estimated loss of $390 million. Cyber theft…Aug 31, 2017Aug 31, 2017
Stop Ignoring Dwell Time — It Will Cost You Big TimeCyber threat actors are constantly developing new Tools, Techniques and Procedure (TTP) to break your first line of defense offered by…Aug 31, 2017Aug 31, 2017
Don’t leave the backdoor unlocked for Ransomware!With the fast growth of Internet of Things, anything and everything is becoming connected to the internet.The rise of IoT brings huge…Feb 23, 2017Feb 23, 2017
Don’t be a partner in crime: Secure your IoTOct 21, 2016 Friday morning wasn’t really the time to veg out in front of the TV especially after a night long travel. I was taking it easy…Nov 2, 20161Nov 2, 20161