Models of Deploying EDR: On-Prem or Cloud
…the right alternate for you, and nuances associated with it How Imperative EDR is for Organizations? The endpoints are the entry points used by adversaries to compromise an organization, often… Read more »
…the right alternate for you, and nuances associated with it How Imperative EDR is for Organizations? The endpoints are the entry points used by adversaries to compromise an organization, often… Read more »
A couple of years ago, the world got introduced to Bitcoin, i.e. peer-to-peer money. Its underlying fabric is distributed ledger technology based on blockchain. The world is asking the question… Read more »
Deciphering the History of Time, Gravity, Interstellar, and Theory of Relativity We live in a world full of bewilderment. Making sense of everything around us and deciphering nuances of the… Read more »
Introduction In the previous two parts of this blog, several strategic issues related to defense of our national cyberspace in the broad areas of governance, operational aspects and development of… Read more »
Introduction The imperative of operationalizing the concepts of Cyber Deterrence and Active Defence for defending our national cyberspace was highlighted in the first part of this blog. It was further… Read more »
It was my first session (Project Immortality: Ethical Enquiry) at the NASSCOM-DSCI Annual Information Security Summit 2017. Running frightfully late, I was a bit apprehensive about entering the session but… Read more »