2019 The Year of Cyber Crime

The major cyber crimes from ransomware attacks, Supply chain hacks and evolving tensions with Iran. Since the beginning of 2019, there were news about data breaches, supply chain manipulations, state-breached hacking campaigns and harbingers of cyber war. It seems like the worst is yet to come on 2019. We all are quite familiar with the…

Introduction to SIEM

Introduction to SIEM. Everything you wanted to know about Log Management As more businesses operate online, it’s increasingly important to incorporate cyber security tools and threat detection to prevent downtime. SIEM tools are an important part of the data security ecosystem: they aggregate data from multiple systems and analyze that data to catch abnormal behavior…

Insider Threat

Cyber security threats that originate from within your own company are classified as Insider threats. These aren’t easily detectable as anyone with an authentic access to your network, can pose as a threat. They might be from the people whom we trust. It might be an existing employee or an ex-employee, a vendor, direct and…

Application Performance Monitoring

Why Application Performance Monitoring (APM) is Vital for a Business of all the tools at an IT department’s disposal, application performance monitoring (APM) can have the most impact on an organization’s bottom line. Why? Because the right APM can proactively identify and address performance issues before they cause response time delays, impact employee productivity and…

Cognitive Security AI Driven Cyber Security

The term Artificial Intelligence (AI) collectively refers to a set of intuitive technologies like natural language processing (NLP), machine learning, and data science. These technologies are capable of performing tasks usually attributed to humans, emulating cognitive abilities like learning from experience and using it to consistently improve performance. With AI constantly evolving and acquiring advanced…

Insider Threat Detection

Malicious insiders can cripple critical systems, copy and sell sensitive customer data, and steal corporate secrets. An insider threat is an employee, former employee, contractor, business associate or other person within an organization who has access to critical data and IT systems and therefore could cause harm to the business. Insider threats can be managed…