Transforming SOCs into Cyber Defence centres Rise in cyberattacks and increasing risk to critical infrastructures has been lately plaguing financial institutions, businesses and governments. Today, digitization of business operations, data… Read more »
…the right alternate for you, and nuances associated with it How Imperative EDR is for Organizations? The endpoints are the entry points used by adversaries to compromise an organization, often… Read more »
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices, mature enough,… Read more »
Recently security researchers at Cisco Talos discovered that malicious hackers had injected a malware into Piriform CCleaner and CCleaner Cloud. CCleaner is a PC optimization tool. It removes potentially unwanted… Read more »
Cognitive Computing has just started permeating into our lives and is taking small steps to transform business models in the industry. Its use cases are not limited to speech, image… Read more »