Defining and Understanding User and Entity Behavior Analytics UEBA

Defining and Understanding User and Entity Behavior Analytics (UEBA)

User and Entity Behavior Analytics, or UEBA for short, provides you with a comprehensive solution for IT security while helping find and detect any user or anomaly that might be…

Read More
Why Companies Need Endpoint Protection

Why Companies Need Endpoint Protection

Endpoint protection, also known as endpoint security, is a security solution that addresses malicious cyber-attacks from endpoint devices, such as zero-day exploits, inadvertent data leaks that result from human error,…

Read More
Open EDR
Vietnam Cyber Attacks For 1st Half 2019 More Than Doubled

Vietnam: Cyber Attacks For 1st Half-2019 More Than Doubled

When it comes to cyber-attack and digital security issues, we often report incidents happening in the United States, Europe, and other first-world nations. We rarely feature articles which discuss cybersecurity…

Read More
Common Sense Ways Of Handling Data Digital Or Not

Common Sense Ways Of Handling Data, Digital Or Not

The value and importance of information change depending on how much information there is and the actual “perceived value” that the observer sees when they get a hold of the…

Read More
Penetration Testing and IoT A Conundrum

Penetration Testing and IoT: A Conundrum

Penetration testing is a tried and tested formula, yes, it is somewhat expensive if the company chooses to hire the market leaders of the industry. The focus of the activity…

Read More
36TB Data Breach The Culprit Lenovo’s Obsolete Iomega NAS

36TB Data Breach: The Culprit, Lenovo’s Obsolete Iomega NAS

The probability that Lenovo has earned the infamous record for becoming a subject of the world’s biggest data breach in history is shaping-up fast. The culprit? The still online legacy…

Read More
Singapore’s IT Security Outlook

Singapore’s IT Security Outlook

Singapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…

Read More
Digital Transformation and Implementation of Information Security

Digital Transformation and Implementation of Information Security

Security has been a major concern for everyone recently, especially for companies that use technology as the main component of their service offering. The increasing pressure of consumer expectations is…

Read More
cyber3

Understanding Indicators of Compromise to Improve Your Cybersecurity

Indicators of compromise, or IOC, are forensic data usually found in system log entries or other files that can help identify potential malicious activities or attacks on a network. Essentially,…

Read More
Defining Role Based Access Control or RBAC

Defining Role-Based Access Control, or RBAC

Role-Based Access Control, or what is simply known as RBAC, provides the ability to restrict access to certain systems based on the person’s role within the organization. This has become…

Read More

Page 1 of 7

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register