
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a Zero Trust Architecture?
Zero Trust is a strategy itself. As an initiative it helps you prevent major data breaches by eliminating the concept of trust from an organization’s network architecture. It is rooted in the principle of “never trust, always verify.”

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Session Hijacking?
A session is the period of time when you as a user are actively accessing an application, website, or other online service. Each user session begins when you log into a website or app and ends when you log out of it. For example, when you type your username and password into a banking application, that begins your session on that online application.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Because security weaknesses come in different forms to your organisation, it’s necessary to have a focused and dedicated cyber/Information security team that comprehensively searches for vulnerabilities that go beyond simple risk assessments. Your dedicated security team can include also a Red Team.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let's first understand the prioritization of vulnerabilities.
Traditionally, organizations have used the industry standard CVSS for measuring how easy it is to exploit a vulnerability and how damaging the exploit can be. Scores range from 0 to 10, with 10 being the most severe. CVSS is a great starting point for evaluating the potential impact of a vulnerability.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Who is a Security Architect?
A security architect takes on a vital role in an IT department. You'll design systems, manage employees and help evolve the security needs of the organization. You can rise to this senior-level position once you have garnered extensive experience and credentials in the computer security field.
Read more: Who is a Security Architect and How it is different from Security Auditor

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IBM Security Guardium is designed to help safeguard critical data.
It automatically discovers and classifies 'sensitive data' from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IDS are mostly used for detecting anomalies with the aim of catching the hackers before they do any real damage to the network. They can be either host-based or network-based. Host-based IDS are installed on the client computer while the Network based IDS protection are residing in the network.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Elasticsearch is the central component of the Elastic Stack, a set of open-source tools for data ingestion, enrichment, storage, analysis, and visualization. It is commonly referred to as the “ELK” stack after its components Elasticsearch, Logstash, and Kibana and now also includes Beats.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Many organizations are quickly discovering that threat hunting is the next step in the evolution of the modern SOC, but they remain unsure of how to start threat-hunting or how far along they are in developing their own hunt capabilities. So, the question is --How can you quantify where your organization stands on the road to effective hunting?
Here, we will discuss a general model that can map threat-hunting maturity across any organization.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The basis for this attack often targets applications like Web Servers (i.e., Windows IIS, Apache, etc…); however, application layer attacks have been evolving to application platforms like WordPress, Joomla, Drupal, Magento, and others.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
White Box Penetration Testing:
White box penetration testing involves sharing full network and system information with the tester, including network maps and credentials. This helps to save time and reduce the overall cost of an engagement.
- What Is IPSec? How does IPSec work?
- OWASP Top 10 . Watch Out for these Security Risks in Your Web Applications !
- What is Security Virtualization? How does Virtualized Security work?
- Revisiting Security Fundamentals - The CIA Triad
- What is a Brute Force Attack? How Much TIme it may take to Break Your Password?
- What is PCAP? What are the Different Versions of PCAP?
- Let Us Compare SSL and TLS
- What is Security Onion? How Powerful Security Onion Actually is?
- What is Volume-based DDoS Attack? Know about Top-3 Largest Known DDoS Attacks
- What is VPN ? How Can You Choose a Good VPN ?