Models of Deploying EDR: On-Prem or Cloud
…the right alternate for you, and nuances associated with it How Imperative EDR is for Organizations? The endpoints are the entry points used by adversaries to compromise an organization, often… Read more »
…the right alternate for you, and nuances associated with it How Imperative EDR is for Organizations? The endpoints are the entry points used by adversaries to compromise an organization, often… Read more »
A couple of years ago, the world got introduced to Bitcoin, i.e. peer-to-peer money. Its underlying fabric is distributed ledger technology based on blockchain. The world is asking the question… Read more »
Introduction In the previous two parts of this blog, several strategic issues related to defense of our national cyberspace in the broad areas of governance, operational aspects and development of… Read more »
Introduction The imperative of operationalizing the concepts of Cyber Deterrence and Active Defence for defending our national cyberspace was highlighted in the first part of this blog. It was further… Read more »
When it comes to cyber security in and of our country, there is a lot to achieve. This write-up attempts to discuss some of the issues which have strategic significance… Read more »
… What it means for a nation and businesses? The digital revolution has had a profound economic and social impact on the world at large. Transforming international trade, traditional business… Read more »