
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
-
October and beginning of November, 2020 saw Google urgently patching 2-zero day vulnerabilities in Chrome.
-
Microsoft’s November 2020 Patch Tuesday fixes zero day bug in Windows 10.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IDS/IPS sensors operate in promiscuous mode by default. This means that a device (often a switch) captures traffic for the sensor and forwards a copy for analysis to the sensor. Because the device is working with a copy of the traffic, the device is performing intrusion detection. It can detect an attack and send an alert (and take other actions), but it does not prevent the attack from entering the network or a network segment.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
According to the SANS Institute, network security is the process of taking preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure. Implementing these measures allows computers, users and programs to perform their permitted critical functions within a secure environment.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A disaster recovery plan involves policies, tools, and procedures to recover a digital system’s infrastructure after a natural disaster or any variety of data breach occurs.
Read more: What is a Disaster Recovery Plan? What Must it Include?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Proactive cyber security involves identifying and addressing security risks before an attack occurs, whereas reactive cyber security involves defending against attacks that have already happened.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is being done to protect this information?
Businesses that handle data belonging to their customers are being scrutinized more and more with the arrival of regulatory changes such as the EU's General Data Protection Regulation, designed to create a level playing field and stipulate adequate security measures to protect consumer privacy and data.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
To effectively protect your data, your organization’s access control policy must address these (and other) questions:
-
Who should access your company’s data?
-
How do you make sure those who attempt access have actually been granted that access?
-
Under which circumstances do you deny access to a user with access privileges?
Read more: What is Access Control? What are the Key Considerations?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This guidance is designed for organisations looking to protect themselves in cyberspace.
We believe that understanding the cyber environment and adopting an approach aligned with the 10 Steps is an effective means to help protect your organisation from attacks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
When you start investigating any cybersecurity incident, your prime focus is to scope the incident properly.
What you do basically is that you attempt to identify all systems with which the attacker has interacted before and during the attack. This includes systems where the attacker has placed persistent malware, executed utilities, harvested data, or simply logged into as part of the reconnaissance phase.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Managing network security across today’s complex, extended architectures is hard work. In the face of sophisticated adversaries, security controls are needed everywhere: in your data center and private and public clouds, at remote sites, and for your mobile workers.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IT IS A VERY SPECIAL POST I AM WRITING FOR YOU.
Here are some insights I gained when I was studying 'State Of Cybersecurity Report 2020' by Accenture.
This report is about the CYBER RESILIENCY of companies. It begins by stating that-
- What is Unified Threat Management? What is the Difference between NGFW and UTM?
- Types Of CyberSecurity
- What are Information Security Controls? What are Major Compliance-based Frameworks?
- What are INDICATORS OF EXPOSURE (IOE) ?
- What is Pyramid of Pain? Why are TTPs placed at Top?
- Let's take a Deeper look at Cisco's Next Generation Firewall 'FirePOWER'
- How SQL Injection Works? How Can You Prevent SQL Injection ?
- Why do you need Storage Monitoring? How can you Diagnose Storage Performance Problems ?
- What is ZigBee? How does it work?
- What is Network Discovery? What are the Best Tools for Network Mapping?