The most recent content from our members.
As we move into the New Year, it is time for us to have a look at some threats that we need to be guarded against. In this blog post, let us look at how Ransomware is likely to become more sophisticated in 2014. Here are a few trends observed this year that may well continue well into 2014, with some new and interesting…
The previous article on SANS Security Survey 2013 discussed about the security needs and challenges in enterprises to detect threats and the complexity to respond to breaches and attacks, etc. Further to detecting threats and responding to them, we got some insights on the kind of data used by organizations for security…
Over the last 3-4 days, we have been discussing several revelations that came out of the SANS Security Survey 2013. We had a glimpse of how organizations used security reports, how well organizations were equipped to collect security data and correlate that for threat intelligence and more. Now, that takes us to the final…
Week 4 of NCSAM and its time for some awareness on Cybercrimes!! With the continuous increase of cybercrimes, nearly every enterprise is affected in some way. PricewaterhouseCoopers (PWC) recently conducted a survey on the Cybercrimes in the US. The survey revealed the following: * Organizations are not well-informed about…
I’ve recently been tasked with assessing the implementation of a log correlation product for an organization. I won’t mention the product name, but its consumption-based licensing model is infamous throughout IT shops far and wide. I don’t usually do this kind of work, but the organization wants to use it as a SIEM,…
Managing the IT infrastructure for your organisation and shielding your network against security threats can be a thankless job. It can require a lot of time and expertise. Below are some key pain points that IT professionals can face on a daily basis when trying to manage a secure network 1. Extracting useful information…
It looks like you're new here. Sign in or register to get started.