
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Every day, new techniques to compromise computing environments are created, and it is a great challenge for the information security market to keep up with this speed, and even be ahead so as not to act reactively. For this reason, the implementation of a good IDS policy is fundamental in a security architecture, since this feature, if constantly updated, is able to keep the infrastructure away from opportunistic attacks, either from a network perspective, or by compromising a computer itself.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
“Security vulnerabilities are discovered all the time and people want to be able to report them directly to the organization responsible. These reports can provide you with valuable information that you can use to improve the security of your systems. It really is in your best interest to encourage vulnerability disclosure.”

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
-
October and beginning of November, 2020 saw Google urgently patching 2-zero day vulnerabilities in Chrome.
-
Microsoft’s November 2020 Patch Tuesday fixes zero day bug in Windows 10.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IDS/IPS sensors operate in promiscuous mode by default. This means that a device (often a switch) captures traffic for the sensor and forwards a copy for analysis to the sensor. Because the device is working with a copy of the traffic, the device is performing intrusion detection. It can detect an attack and send an alert (and take other actions), but it does not prevent the attack from entering the network or a network segment.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
According to the SANS Institute, network security is the process of taking preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure. Implementing these measures allows computers, users and programs to perform their permitted critical functions within a secure environment.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A disaster recovery plan involves policies, tools, and procedures to recover a digital system’s infrastructure after a natural disaster or any variety of data breach occurs.
Read more: What is a Disaster Recovery Plan? What Must it Include?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Proactive cyber security involves identifying and addressing security risks before an attack occurs, whereas reactive cyber security involves defending against attacks that have already happened.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is being done to protect this information?
Businesses that handle data belonging to their customers are being scrutinized more and more with the arrival of regulatory changes such as the EU's General Data Protection Regulation, designed to create a level playing field and stipulate adequate security measures to protect consumer privacy and data.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
To effectively protect your data, your organization’s access control policy must address these (and other) questions:
-
Who should access your company’s data?
-
How do you make sure those who attempt access have actually been granted that access?
-
Under which circumstances do you deny access to a user with access privileges?
Read more: What is Access Control? What are the Key Considerations?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This guidance is designed for organisations looking to protect themselves in cyberspace.
We believe that understanding the cyber environment and adopting an approach aligned with the 10 Steps is an effective means to help protect your organisation from attacks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
When you start investigating any cybersecurity incident, your prime focus is to scope the incident properly.
What you do basically is that you attempt to identify all systems with which the attacker has interacted before and during the attack. This includes systems where the attacker has placed persistent malware, executed utilities, harvested data, or simply logged into as part of the reconnaissance phase.
- What is Cisco Defense Orchestrator? What Devices can you Manage with it?
- What is Cyber Resilience? What are Leaders Doing Differently?
- What is Unified Threat Management? What is the Difference between NGFW and UTM?
- Types Of CyberSecurity
- What are Information Security Controls? What are Major Compliance-based Frameworks?
- What are INDICATORS OF EXPOSURE (IOE) ?
- What is Pyramid of Pain? Why are TTPs placed at Top?
- Let's take a Deeper look at Cisco's Next Generation Firewall 'FirePOWER'
- How SQL Injection Works? How Can You Prevent SQL Injection ?
- Why do you need Storage Monitoring? How can you Diagnose Storage Performance Problems ?