Vulnerability Remediation Tracking
Vulnerability remediation tracking is one of the important components of cyber security practices. In this blog post, we gathered all the necessary information you must have in regards to this topic.
Vulnerability remediation tracking is one of the important components of cyber security practices. In this blog post, we gathered all the necessary information you must have in regards to this topic.
You might have noticed this incident: Users of some online service providers lose their accounts en masse yet the companies assert that there haven’t been any intruders on their systems. It may sound unlikely, but in most cases they have a valid point. With the new hacking technique called credential stuffing, it is possible. Read our article to learn more.
Threat hunting is an indispensable component of cyber security operations. In this article, we provide you with a guideline that will help you come up with a methodology and a plan of action for your threat hunting practices.
Information security covers a wide area of various practices and techniques. In this article, we will take a closer look at the main components of this field.
If you are involved in the cyber security processes, you must have heard of the term threat hunting. In this article, we discussed this rather popular concept in detail. Being one of the buzzing concepts of cyber security, threat hunting has been increasingly popular, but what does it refer to? Do you need it? Should you be doing it? We will answer all these questions in detail.
SIEM deployment process can be rather involved and overwhelming since SIEM can offer a wide array of solutions for different needs of your organization. In this blog post, we discussed the deployment process of SIEM and added a brief checklist. SIEM tools have been one of the most topical tools in the industry for a while now. They offer a wide range of solutions to organizations from various backgrounds and sectors.
Indicator of compromise or IOC is a forensic term that refers to the evidence on a device that points out to a security breach. In this article, we discussed how IOC can be useful for your cyber security team.
It is crucial to invest in cyber security due to state of cybersecurity today. Before making any decisions concerning the security posture of your business, you must consider the Return on Security Investment. In this article, we took a closer look at what ROSI is and how it is calculated.
Cyber defence intelligence has been one of the most popular topics of discussion within the IT circles. What is it? Why is it important? Should you invest in it? We sought answers to all these questions in our article. What is Cyber Defence Intelligence?
What is CSIRT? CSIRT (pronounced see-sirt) refers to the computer security incident response team. The main responsibility of the CSIRT is to expose and avert cyber attacks targeting an organization. As the number of cyber threats grow each and every day, the importance of having a security team that is solely focused on incident response (IR) is fundamental.