Updating your main database: your brain

  • All
  • Cybersecurity
  • Network Management
  • Big Data
  • Open Source
  • Startup
  • Malware

June 10 2019

event, alert, and incident

Event, alert, and incident. What is the difference?

There could be variance in these definitions due to differences in their businesses and their needs

  Read more

April 26 2019

Why Ciber security dashboard?

In much the same way, the function of a dashboard is to provide real-time results by aggregating and extracting value from all the data you collect, otherwise known as your key performance indicators (KPIs). Cyber Security Dashboard can help you steer your organisation towards the desired cyber security position, while providing answers to key questions often raised by executives.

  Read more
Network Management

March 21 2019

The growing threat of attacks in banks

Financial institutions are particularly exposed to cyber risk due to their reliance on critical infrastructures and their dependence on highly interconnected networks. More and more, financial services organizations are operating under a constant state of attack, leaving IT and security teams challenged in their ability to collect, disseminate and interpret malicious events.


  Read more

December 10 2018

What makes public Wi-Fi vulnerable to attack

If you plan on taking chances with your data and are willing to connect to Public WIFI look out for these top five hacks.


  Read more

December 04 2018

The major security threats facing Industry 4.0

Industry 4.0 and the technology involved have security vulnerabilities as other organizational systems. They have to manage the same external and insider threats as all businesses of all sizes have to handle in the current sophisticated cyber security sphere.

These are some security threats that Industry 4.0 players need to focus on, and try to mitigate its impact.


  Read more
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read more