Ramakrishnan SeshagiriComments Off on Choosing your Monitoring Solution (SIEM vs SIEMaaS vs SOCaaS)
Why monitor? According to a Q4 2021 Internet security report from WatchGuard, almost 66% of all threats were zero-day vulnerabilities. Another statistic from Mandiant Threat Intelligence report states about 40%… Read more »
Praful KallaComments Off on An Overview of Insider Threats
Introduction An insider threat trouble is a security threat that originates from within the targeted association. It generally involves a current or former hand or business associate who has access… Read more »
Anisha KoshyComments Off on Public Policy for AI Operated World
The technological landscape surrounding AI is a changing space, and to keep up, much less harness its capabilities for the public good will be a gargantuan attempt. But as it stands, the outlook that Indian has taken so far is a step in the right direction with an equitable balance of caution and hope.
Amit GhoshComments Off on Advisory for Law Enforcement Agencies
As Coronavirus is continuously causing widespread disruption, the Law Enforcement Agencies (LEAs) confront a major challenge of controlling the spread of the disease and maintain law & order.
Lt Gen R S PanwarComments Off on Strategic Thinking for Security: Defending the National Cyberspace – Part II
Introduction The imperative of operationalizing the concepts of Cyber Deterrence and Active Defence for defending our national cyberspace was highlighted in the first part of this blog. It was further… Read more »