Protecting The Cloud with CASB: A Top-down Approach
Friday, November 17, 2017
Posted by Cyber Security ...
Reader's rate:
0
There are benefits of hosted enterprise IT applications in the cloud. Simplified deployments, operational and maintenance efficiencies, agility, and requiring no patching of software make the cloud model a favourable method to deliver new functionality to the enterprise while significantly... + continue reading
Thursday, November 16, 2017
Posted by Cyber Security ...
Reader's rate:
0
Challenges  In URL and SSL strategy architecture model, it is very challenging to have standardized URL strategy for multiple products of any platform. URL and SSL strategy implementation is technical feasible for deployment but how to ensure session management and how to host multiple... + continue reading
Securely understanding what is in the network!
Wednesday, November 8, 2017
Posted by Cyber Security ...
Reader's rate:
0
With the advent of mobile devices, the data flowing between customer and service provider organization has grown many folds. The sheer volume and variety of data carried in the network makes it difficult for the organization to monitor the user experience and the security of the services.... + continue reading
DMZ your Internet facing application to protect from Cyber Security threats
Wednesday, November 8, 2017
Posted by Cyber Security ...
Reader's rate:
0
Geopolitically, a demilitarized zone (DMZ) is an area that runs between two territories that are hostile to one another or two opposing forces' battle lines. The term was first widely used to refer to the strip of land that cuts across the Korean peninsula and separates the North from the... + continue reading
Thursday, November 2, 2017
Posted by Cyber Security ...
Reader's rate:
0
There are over 3 million apps on Google play store and among them, finance category has over 66000 apps and continuously growing. But, how many apps actually detect the hostile environment of the device these apps run on and behave accordingly, still remains a big question.   A... + continue reading
Protecting The Cloud with CASB: A Top-down Approach
Securely understanding what is in the network!
DMZ your Internet facing application to protect from Cyber Security threats

Home Page

Security Articles

Protecting The Cloud with CASB: A Top-down Approach
35views
reads
0 today
Friday, 17/11/17 - 0 comment(s)
There are benefits of hosted enterprise IT applications in the cloud. Simplified deployments, operational and maintenance efficiencies, agility, and requiring no patching of software make the... + continue reading

Best Practices

844
reads
0 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Thursday, 21/09/17
332views
reads
0 today
0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
2,036
reads
0 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Protecting The Cloud with CASB: A Top-down Approach
Views:
35
reads
0 today
Friday, 17/11/17 - 0 comment(s)
There are benefits of hosted enterprise IT applications in the cloud. Simplified deployments, operational and maintenance efficiencies, agility, and requiring no patching of software make the... + continue reading

This Month Most Popular

All You Need To Know About KRACK Wi-Fi Attack
210views
reads
0 today
Friday, 27/10/17 - 0 comment(s)
What is KRACK? A new security flaw has been discovered and it affects practically everyone who uses Wi-Fi. The flaw named as KRACK for key reinstallation attack was discovered in the security... + continue reading

Featured Articles

Protecting The Cloud with CASB: A Top-down Approach
Friday, 17/11/17
Total views: 35
0 comment(s)
There are benefits of hosted enterprise IT applications in the cloud. Simplified deployments, operational and maintenance efficiencies, agility, and requiring no patching of software make the cloud model a favourable method to deliver new functionality to the enterprise while significantly reducing costs.   Given that new... + continue reading
Thursday, 16/11/17
Total views: 39
0 comment(s)
Challenges  In URL and SSL strategy architecture model, it is very challenging to have standardized URL strategy for multiple products of any platform. URL and SSL strategy implementation is technical feasible for deployment but how to ensure session management and how to host multiple environment is bit concerned. It becomes utmost... + continue reading
Securely understanding what is in the network!
Wednesday, 08/11/17
Total views: 97
0 comment(s)
With the advent of mobile devices, the data flowing between customer and service provider organization has grown many folds. The sheer volume and variety of data carried in the network makes it difficult for the organization to monitor the user experience and the security of the services.   Organization wants to have visibility... + continue reading
DMZ your Internet facing application to protect from Cyber Security threats
Wednesday, 08/11/17
Total views: 117
0 comment(s)
Geopolitically, a demilitarized zone (DMZ) is an area that runs between two territories that are hostile to one another or two opposing forces' battle lines. The term was first widely used to refer to the strip of land that cuts across the Korean peninsula and separates the North from the South.   In computer security, a DMZ or... + continue reading