
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Operational technology (OT) is the use of hardware and software to monitor and control physical processes, devices, and infrastructure. Operational technology systems are found across a large range of asset-intensive sectors. They are performing a wide variety of tasks ranging from monitoring critical infrastructure (CI) to controlling robots on a manufacturing floor.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The attacker’s goal is to perform reconnaissance by harnessing the power of freely available information extracted using different intelligence gathering modes before executing a targeted attack.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
THE SHORTAGE OF CYBERSECURITY TALENT IS GETTING WORSE
2020 has been a challenging year on various fronts. Among those challenges are cyber threats across all industries. Cyberattacks increased during the pandemic response and workforce shift. Research, hospital systems and healthcare industries endured severe cyberattacks, resulting in breaches, ransomware and outages – and the threats show no signs of slowing down.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A disaster recovery plan (DRP) is a highly organised documented strategy that “describes how an organisation can quickly resume work after an unplanned incident”. It is an essential part of a business continuity plan (BCP), assisting the company in the recovery of system functionality and data loss so everything can perform perfectly in the aftermath of an incident.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
More data and applications are moving to the cloud, which creates unique infosecurity challenges.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Lightweight Directory Access Protocol (LDAP) is a standard application protocol for accessing and managing a directory service. It is supported by most vendor directory services, including Active Directory (AD), and facilitates the sharing of information on users, systems, networks, services, and applications with applications and services that need it.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A targeted attack refers to a type of threat in which threat actors actively pursue and compromise a target entity’s infrastructure while maintaining anonymity. These attackers have a certain level of expertise and have sufficient resources to conduct their schemes over a long-term period. They can adapt, adjust, or improve their attacks to counter their victim’s defenses.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Containers offer a logical packaging mechanism in which applications can be abstracted from the environment in which they actually run. This decoupling allows container-based applications to be deployed easily and consistently, regardless of whether the target environment is a private data center, the public cloud, or even a developer’s personal laptop.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There’s a wide range of security practices and approaches that can be applied for risk assessment. The three most popular are:
-
Penetration testing
-
Red team testing
-
Risk-based testing
Read more: 3-Security Testing Approaches to Risk Assessment.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is basically an extension of the initial e-mail protocol known as SMTP and allows the users to use the protocol for sharing various kinds of data files on the Internet such as Audio, video, images and various program files along with ASCII text as deployed in the original one.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You certainly know what Google is: it’s a search engine that finds websites. However, it only scratches the surface of what we can find on the Internet. Just because something isn’t on Google, doesn’t mean it’s unfindable.
- IDS/IPS: Why Are They So Important?
- What is Vulnerability Disclosure? How does it work?
- What is ZERO Day? Ans. Nightmare
- What is the Difference Between Promiscuous Mode & Inline Mode?
- What Is Network Security? How does Network Security work?
- What is a Disaster Recovery Plan? What Must it Include?
- What is Reactive Cybersecurity? What is Proactive Cybersecurity?
- What are you doing with Citizen Data? At least, Be Beware of Online Privacy Issues.
- What is Access Control? What are the Key Considerations?
- 10 Steps to CyberSecurity