THE MAGNITUDE OF CYBER ESPIONAGE AND ADDRESSING IT WITH THREAT INTELLIGENCEBy Vijay Bharti On 30 Mar 2020
In the current digitally advanced world, we hear about armies of immoral hackers secretly spying on their targets and stealing information—classified, sensitive data or intellectual property. This practice of secretly gaining access to critical information without permission from the data...
How SIEM Systems can Improve the Detection of Events of InterestBy Vijay Bharti On 17 Aug 2015
Currently, enterprise awareness on cyber threats is high, and organizations are investing considerably in security solutions and the latest security tools. Nonetheless, the rising incidence of high-profile and successful attacks clearly demonstrate the need for more effective threat detection and...
The High Cost of False Positives to an OrganizationBy Vijay Bharti On 17 Aug 2015
Cyber security teams are under tremendous pressure to safeguard their IT infrastructure and business data against the escalating threat of breaches. Even as organizations increasingly look to automated security tools to deal with threats, the downside to these cannot be...
Combating Cybersecurity Threats through Risk Assessment and ComplianceBy Vijay Bharti On 23 Feb 2015
Technologies are evolving, getting complex by the day; so are cyber security risks. Businesses operating in an interconnected, digital world are wholly dependent on technology to drive profitability, and thus need to be aware of imminent threats in the technology...
Security threat caused by endpoint vulnerabilities.By Vijay Bharti On 19 Sep 2014
Sitting at the end of a network point or at any of the nodes of a corporate network, are countless PCs, laptops, smartphones, tablets or even equipment such as barcode readers and scanners. Each one of them is a security...
These blogs might interest you
by Anand Veeramani on 30 Mar 2020
by Manu Tayal on 26 Mar 2020
by Manish Mehrotra on 26 Mar 2020
by Nitin Khobragade on 24 Mar 2020
Subscribe for blog updates