- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is URL Filtering?
You and other employees in your company carry out a lot web/internet activities on daily basis, e.g., surfing your favorite websites, clicking on the links in the emails, accessing a number of web/cloud-based applications for your personal or business usages, etc. Each time you do any such thing, you are practically inviting a large number of threats to your corporate networks.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Quarterly Threat Insights Report of HP (March 2021) reported that approx. 29% of cyber-threats they observed were 'Unknown' cyber-threats, means, were not known before.
This post is intended to shift your attention to Unknown cyberthreats...
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is An Exploit Kit?
Let us first understand what an exploit is...
An exploit in most situations are some programs, files, or codes that are developed by threat-actors to take advantage of some vulnerabilities in a 'Software' or OS, to bypass your computers or network safeguards to infect your device.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
DNS is a critical and foundational protocol of the internet and it is often described as the 'Phonebook of the internet'. The primary purpose of DNS is to mapping domain names to IP addresses. DNS will translates human-friendly URLs, such as www.firstlook.com, into machine-friendly IP addresses, such as 192.167.82.137. Without DNS, it would be nearly impossible for us to find anything on internet. Right?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let yourself think from the perspective of a hacker...
You won't be happy or content with infecting just a machine of the targeted network. Will you? Of course not. Once you have gained an initial foothold, then you would want to pivot, infect and control other machines of the network too. This is when you would need a robust C&C communication with all those infected machines (called Zombies or bots). Your C&C would help you to maintain a persistent presence and to exfiltrate some valuable data later. You can control all zombie-machines via remote C&C.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Every time whenever you walk to a private doctor or into a private hospital, you are leaving behind a large information about yourself there. This set of information is quite important and you do not want this information to be disclosed. Sometime, you may make some personal disclosure to your private doctors, which you don't want to share with anybody else.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
When you decide to use any cloud storage service, you and your employees will be able to log in from anywhere using internet, to upload and retrieve their data.
But all cloud storage providers don't offer the same level of data protection options to you including cloud encryption...
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The idea behind writing this post is to differentiate the Information's Security and Cybersecurity.
I have found that people are still struggling to make a good distinction between these too.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let me be a little specific here...
Cyber criminals actually prefer to go after companies' SHADOW IT ecosystem. Because it is where they find more entry-points to your network. They target more into the software and applications used or installed by your employees, without the approval and/or knowledge of your IT department.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You always want to ensure that only authorized users are allowed to access your systems & resources. Before the issue of authorized access is handled, you have to tackle the issue of 'Authentication'.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
How Can You Leverage Threat Intelligence Best?
Threat intelligence is knowledge if you have it would allow you to prevent or mitigate a large number of cyber-attacks on your organisation. It is a special form of data that is great in giving you the CONTEXT of:
- What is Patch Management? Why is Patch Management Damn Important?
- What is Triage in Cybersecurity?
- What is a Cybersecurity Audit? 5 Best Practices for a Cybersecurity Audit
- What are CIS Controls? What was the need for CIS Controls - Version 8 ?
- What are Malicious Macros?
- What is Threat Modelling?
- What is CASB? What are 4-Pillars of CASB?
- What is Deep Packet Inspection? How Can You Use DPI in Security?
- DDoS Mitigation - How Can You Mitigate DDoS Attacks?
- Requirement #10 of PCI-DSS . Why does it Matter a lot ?
IT PANORAMAApplication Platform Optimization
|
CYBER WARRIOR'S
|
CERTIFICATIONSCCNA CCNP - Project & Assignment Help |
MANAGEMENT CONSULTANCYLean Six Sigma Certification Training LSS Black Belt Program (On-site) LSS Green Belt Program (On-site)
|
BLOGS |
CONTACT US
© 2013 Luminis Consulting Services P Ltd, IN |