Compliance, Cyber Resilience, Cyber Security, Security Architecture, Security Operation Center

How TOGAF ADM Can Help to Build Security Operation Center

As security architects, we are always challenged with relating business problems, threats, and agile IT to build security without hampering user experience and at the same time secure the crown jewels from lurking cybercriminals. Every CISO might dream of “to have a single screen which tells you how your organization current security posture looks like, which are the risk associated…

Continue Reading

Application Security, Cloud, Compliance, Cyber Resilience, Cyber Security

Cybersecurity – Holistic View

In the past six months, our entire world has changed drastically, the business world is no exception to that, most of the businesses have to fast forward their digitization plans which were originally designed for five years. They have to execute these plans in just a few months, many employees are working from home for the first time and all…

Continue Reading

Artificial Intelligence, Automation, Cyber Security, Machine Learning

Cybersecurity Automation Best Practices

The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale…

Continue Reading

Chaos Engineering, Cyber Resilience, Cyber Security

How Chaos Engineering can help to achieve Cyber Resilience?

The enterprise infrastructure is becoming more and more distributed and hence complex because of the technological innovations, digitization, proliferation of IoT devices. The current pandemic situation has added to this complexity by accelerating cloud migration projects, cloud-native solutions, and employees Working From Home (WFH). The survey jointly conducted by McAfee and Centre for Long Term Cybersecurity indicates that, across the…

Continue Reading

Cyber Security, Data Privacy, IoT, Secure Online, Smart Home, Social Engineering

How to Become Anonymus Online

October 2020 is the 17th year of National Cybersecurity Awareness Month (NCAM). This year has special importance to this month as during the pandemic many aspects of our personal and professional life such as kids’ school, the way we socialize, the way in which we conduct business conferences, and daily activities as a part of the business. Now it is…

Continue Reading

Cyber Resilience, Cyber Security, Deception

Next Steps to Cybersecurity – Cyber Resilience

Most of us awestruck by the exponential speed at which the Coronavirus, Covid-19 spread throughout the world. This has affected our personal life as well as the way business work, most of the organization turned to Work From Home (WFH) for their employees. This resulted in migrating business applications or workloads to the cloud and speeding up other digitization projects.…

Continue Reading

Artificial Intelligence, Automation, Big Data, Cyber Security

From Cybersecurity Sisyphus to Cybersecurity Alchemist

Greek civilization was the most influential civilization in the history of the world. Although people of all countries, eras, and stages of civilization have developed myths that explain the existence and workings of natural phenomena, recount the deeds of gods or heroes, or seek to justify social or political institutions, the myths of the Greeks have remained unrivaled in the…

Continue Reading