The attacks are all automated, manual ways to ensure protection is too slow and ineffective. An organization would want to know its security posture, and out of the myriad number of issues that are identified, would like to prioritize what
Cloud Services – Categories IaaS: Infrastructure as a Service. These are the compute resources, Virtual Machines, Containers, Serverless compute. PaaS: Platform as a Service. Software components made available as a service. Example Database as a service. SaaS: Software as a
Risk Based Compliance Management Compliance means conforming to a rule, such as a specification, policy, standard or law. Some compliances are generic in nature catering to all kinds of organizations and sizes, example ISO 27001:2013, NIST-CSF whereas few are more
Informational blog post on Vulnerability Assessment and Penetration Testing, its applicability in Risk Based Vulnerability Management.
This is an informative blogpost on Risk Based Vulnerability Management. How organizations can manage & prioritize remediation of their issues.
What is Cyber Risk Management? In this new age economy, organizations either get digitized or perish. It is estimated that about 85% of the business assets are in digital form. While digitization creates opportunities, it comes with sizeable risk. But
Yourstory Covers Seconize – Cybersecurity startups in focus as the new normal leaves businesses vulnerable to attacks For Indian cybersecurity startups, COVID-19 presents a rare opportunity to cement their standing among larger rivals, as they address the growing demand for
Reliving good food and importance of the occasional but precious Team Outing moments - Feb 2020. Waiting for COVID lockdown to go down and return of normalcy, here's praying for a safe passing for all of us. Till then feast