Cyber Threat Intelligence
-
Tips to Choosing The Right Enterprise Security Vendor
By Raghuram Gorur On 2 Mar 2016The stakes are high indeed when it comes to enterprise security. A single breach can have a plethora of effect on a company, resulting in financial and reputational damage. The hard fact is that enterprise security is something we cannot...
Cloud Services Cyber Security Cyber Threat Intelligence Identity & Access Governance Infrastructure Security
-
Of Honeypots, Decoys and Red Herrings
By Manoj Rai On 9 Feb 2016A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
Cyber Security Cyber Threat Intelligence Security Threat Management
-
Staying Afloat During a Cyber-Attack
By Raghuram Gorur On 20 Jan 2016Given the rising frequency of increasingly malicious and innovative cyber-attacks, one can safely conclude that cyber risk is here to stay. It is no longer a question of ‘if’ but ‘when’ your organization will have to deal with a cyber-attack....
Cyber Security Cyber Threat Intelligence Infrastructure Security
-
The High Cost of False Positives to an Organization
By Vijay Bharti On 17 Aug 2015Cyber security teams are under tremendous pressure to safeguard their IT infrastructure and business data against the escalating threat of breaches. Even as organizations increasingly look to automated security tools to deal with threats, the downside to these cannot be...
-
Cyber Threat Intelligence – What is needed?
By Haren Bhatt On 6 Apr 2015Cyber Threat Intelligence (CTI) is a term used to address any kind of information that protects your organization's IT assets from potential security impeachment. CTI can take many forms. It could be internet based IP addresses or geo locations TTP's...
Tag Cloud
Subscribe for blog updates