- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a Rootkit?
A rootkit is a malicious software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its software. A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers, password stealers, antivirus disablers, and bots for DDoS attacks. This software remain hidden in the computer and allow the attacker remote access to the computer.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You have got a new IDS device installed...
Your IDS has started to see the traffic moving across your network...
Oh Yeh, your IDS has started generating Events...
What is next?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Threat intelligence as an information security discipline that seeks to recognize and understand sophisticated cyber adversaries, specifically why and how they threaten data, networks, and business processes.”
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Successful attacks on computers/network systems rarely look like real attacks. It is only in hindsight that you would know that if an attack is actually happening. This is also the reason that somewhere we always need the human eye to catch it, although a lot of advancements are happening with Machine Learning and AI.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Handling a corporate security breach is likely to be one of the most intense moments of your security career. In this day and age, it is an accepted truth that all organizations will be breached at some point - what is important is how YOU handle it.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If you happen to be someone who is actually on Network Infrastructure Job-role, but expected to look after the IT security needs of the organisation… If you constantly feel the lack of right budgetary allocations by the management to the IT security needs, then this post is for you.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Inadequate security and eager cybercriminals have led enterprise data breaches to increase at an alarming pace. Staggering numbers of affected customers — and huge financial losses to companies — continue to send shock waves through the business world, and threaten user trust. This global proliferation of cyber-attacks has resulted in one particular component of cryptography, i.e., ENCRYPTION, to become critical in the effort to safeguard sensitive data and intellectual property (IP).
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a Zero Trust Architecture?
Zero Trust is a strategy itself. As an initiative it helps you prevent major data breaches by eliminating the concept of trust from an organization’s network architecture. It is rooted in the principle of “never trust, always verify.”
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Session Hijacking?
A session is the period of time when you as a user are actively accessing an application, website, or other online service. Each user session begins when you log into a website or app and ends when you log out of it. For example, when you type your username and password into a banking application, that begins your session on that online application.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Because security weaknesses come in different forms to your organisation, it’s necessary to have a focused and dedicated cyber/Information security team that comprehensively searches for vulnerabilities that go beyond simple risk assessments. Your dedicated security team can include also a Red Team.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let's first understand the prioritization of vulnerabilities.
Traditionally, organizations have used the industry standard CVSS for measuring how easy it is to exploit a vulnerability and how damaging the exploit can be. Scores range from 0 to 10, with 10 being the most severe. CVSS is a great starting point for evaluating the potential impact of a vulnerability.
- Who is a Security Architect and How it is different from Security Auditor
- What is IBM Security Guardium? What does it Guard?
- How Does Intrusion Detection System Actually work? What are the Major Types of IDS?
- What is Elasticsearch Stack? How does Elasticsearch work?
- What is (Threat) Hunting Maturity Model?
- What are Application Layer DDoS Attacks?
- 3-Types of Penetration Testing
- What Is IPSec? How does IPSec work?
- OWASP Top 10 . Watch Out for these Security Risks in Your Web Applications !
- What is Security Virtualization? How does Virtualized Security work?
IT PANORAMAApplication Platform Optimization
|
CYBER WARRIOR'S
|
CERTIFICATIONSCCNA CCNP - Project & Assignment Help |
MANAGEMENT CONSULTANCYLean Six Sigma Certification Training LSS Black Belt Program (On-site) LSS Green Belt Program (On-site)
|
BLOGS |
CONTACT US
© 2013 Luminis Consulting Services P Ltd, IN |