How to use KPIs to generate results in Cybersecurity?
Obtaining investment from business leaders to create a mature cybersecurity program and fund initiatives is imperative to success in enterprise risk mitigation. Often, security a...
Obtaining investment from business leaders to create a mature cybersecurity program and fund initiatives is imperative to success in enterprise risk mitigation. Often, security a...
You've probably read an article, watched a talk or listened to a webinar about what the term XDR, also known as extended detection and response, is. The cyber security research f...
SIEM is a powerful security tool when implemented correctly. Network security devices such as IDS devices, IPS devices and firewalls generate a large number of logs. A well-confi...
The number of users, devices and resources on enterprise networks is growing exponentially. With this expanding attack surface, a company's assets, intellectual property, reputat...
Cybersecurity specialists have noted several worrying trends over the past year, with ransomware being one of the most. Admittedly, this is far from a new problem, but it is now ...
As the threat landscape evolves faster than we can keep up with, organizations need to be aware of the type of threats they may face. Certain types of threats, such as ransomware...
After the last post where we learned about deep packet inspection (DPI), we will talk about how this tool can be used in security products such as redborder. 1. The DPI exam...
If you are browsing any website ... If you are sending an email ... If you are watching a movie on Netflix ... If you are making a Skype call or a Zoom meeting ... It...
Today's fast-paced world means changing the approach to security. Traditional ways of protecting networks or facilities often involved responding to threats after they occurred or ...
Performing a pentesting test on a regular basis is a useful way to identify serious vulnerabilities in an IT environment. This work will be performed by a trusted ethical hacker us...