In part, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, we explored SOAR and Threat…
You must have heard the following cloud encryption and key management buzz words: BYOK – Bring Your Own Key BYOV – Bring Your Own Vault…
The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which includes data-at-rest encryption…
Course Content What is SARS-COV-2 (COVID-19)?How to Protect Yourself?Deciding to Reopen the Business During COVID-19Worker Exposure Risk to COVID-19Steps to Reduce Workers’ Risk of Occupational…
Please check earlier blogs “Easy Fix Remote Work Cyber Security Checklist”, “Management, Director and Employee Responsibilities”, “Cybersecurity COVID 19 Guidelines for Small and Large Businesses”…
The article published two weeks ago titled “Coronavirus (COVID-19) Guidance for Small and Large Businesses” listed the important points and resources the large and small…
The article published two weeks ago titled “Coronavirus (COVID-19) Guidance for Small and Large Businesses” listed the important points and resources the large and small…
The article published two weeks ago “Coronavirus (COVID-19) Guidance for Small and Large Businesses” detailed the steps for businesses to follow. Today we are already…
The article published two weeks ago titled “Coronavirus (COVID-19) Guidance for Small and Large Businesses” listed the important points and resources the large and small…
We noted in the last blog that organizations face new challenges and have to prepare for new risks. The sudden change in the way the…