• What is Cloud Asset Management (CAM)?
    Gone are times, when companies used to have their own large computer networks doing everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters... Now CLOUD has changed all that. Today, except their LANs, companies can literally build everything else on cloud. Practically, more...

    Read More

    Like
    2
    4 Answers 0 Shares
  • What is Sandboxes?
    Sandboxes provide ideal, secluded environments to screen certain malware types without giving that malware a chance to spread. Based on the observed behavior, the samples can then be classified as harmless, malicious, or “needs a closer look.” Running programs in such a secluded environment is referred to as sandboxing and the environment the samples are allowed to run in are...

    Read More

    Like
    Yay
    2
    1 Answers 0 Shares
  • Reverse Proxy
    What is Reverse Proxy? Reverse Proxy is a server that is positioned in front of webservers. As a cybersecurity professional, you would place a reverse proxy typically behind the firewall in your private network and it would direct client requests to the appropriate backend server. And in this position, your reverse proxy is able to intercept your users' requests and then it would forward them...

    Read More

    0 Answers 0 Shares
  • The CIA Triad
    When talking about cybersecurity, one might wonder “What are we trying to protect ourselves against?” Well, there are three main aspects we are trying to control, name: ~~) Unauthorised Access ~~) Unauthorised Deletion ~~) Unauthorised Modification The CIA Triad The CIA triad is also commonly referred to as the three pillars of security and most of the security policies of...

    Read More

    Like
    1
    0 Answers 0 Shares
  • Unveiling the Shadows: The Rise of Volt Typhoon and the New Age of Cyber Threats
    The rise of Volt Typhoon, a Chinese hacking group, and their targeting of telecommunications and IT sectors underscores the need for organizations to reassess and fortify their cybersecurity postures. The adoption of comprehensive security frameworks such as Zero Trust becomes essential in countering these evolving cyber threats.

    Read More

    Love
    1
    0 Answers 0 Shares
  • What are the Top IoT Security issues ?
    When IoT technologies appeared on the horizons, the industries such as healthcare, smart cities, building management, public utilities, transportation, and manufacturing etc, picked it up early. Now, IoT is already being used by so many companies. Up to 30% of devices on enterprise networks are IoT devices now, as per a report from Palo Alto. In fact, the world has seen the convergence of IT...

    Read More

    Like
    Yay
    3
    0 Answers 0 Shares
  • What is AAA in Network Security?
    Here AAA stands for Authentication, Authorization, and Accounting. AAA is a security framework that controls access to computer resources, enforces policies, and audits usage. The combined processes of AAA framework play a major role in your network management and cybersecurity, by screening users and keeping track of their activity while they are connected to your network. You whole...

    Read More

    Like
    Yay
    3
    3 Answers 0 Shares
  • What Is Critical Infrastructure?
    Critical infrastructure refers to any virtual or physical networks, systems, and assets critical to a nation that their destruction or incapacitation would harm that national security, public health and safety, economy, or any combination of those. Each nation's critical infrastructure faces threats from various quarters. These include nature (floods, quakes, tornadoes), people (hackers,...

    Read More

    Like
    1
    0 Answers 0 Shares
  • What is IoT?
    It is Internet of Things. It is about things, I mean, devices... IoT is a term which is used to describe a system of interconnected computing devices that use the internet to send/receive data without human intervention or coordination. Internet of Things (IoT) basically encompasses a wide variety of technologies, vendors, and connectivity methods. While cameras, smart kitchen appliances...

    Read More

    Like
    Yay
    3
    2 Answers 1 Shares
  • What is MDM?
    It is Mobile Devices Management. In the recent years, we have seen an huge rise of mobile endpoints like smartphones, laptops and tablets, as a large number of employees are connecting to corporate networks from a wide variety of places and devices. Today due to Covid-19, the work from home model has become very popular. But this multitude of mobile devices is causing a lot of complications...

    Read More

    Like
    2
    1 Answers 0 Shares
More Results