- Details
- Written by: Meena
- Category: Cybersecurity PRISM

If you had distributed networks spread over distributed locations then you needed dedicated appliances that have to be sized and upgraded to accommodate your business growth. You had been doing the upgradation or patching of those yourself and you had to do 'policy management' for each devices.
Now a days, most security vendors have come up a new and revolutionary way of delivering firewall and other network security capabilities as a cloud service, viz., Firewall as a service (FWaaS).
-
What is a FWaaS?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Data Integrity?
In the hindsight, it is a very simple concept. You always want to your data accurately describe (something) as it is intended to.
Thus, the data integrity is about the accuracy and consistent 'validity' of your data over its entire lifecycle. If at any point your data loses its accuracy and validity, then what is the use of this data? Nothing, it's junk!
There have been 2-ways of looking at data integrity:
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a SSL Certificate?
An Secure Sockets Layer (SLL) certificate is a digital certificate that authenticates the identity of a website and encrypts information sent to the webserver using SSL technology.
When your website has a SSL Certificate, every interaction the people and companies have with your website, remain PRIVATE. For example, your customers may be sharing their 'Personal Info' such as names, addresses, etc. when its demanded by your website. Your customers may also be sharing other transactional details such as credit card numbers, or other financial details, etc with you via your website. The SSL Certificate of your website will help you and them to keep this information secure, and private between them and your website.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Datacenter Security?
Datacenter security is an assortment of technological and physical measures which are used to protect a datacenter's assets and resources, thereby shielding it from all sorts of internal and external threats.
You should always design a comprehensive security plan that covers all important aspects of your datacenter, e.g., the networks, servers, power-systems, and the DATA and the PROCESSES they support.
You should take full cognition of 'specific' security threats that are usually faced by datacenters, because your datacenter, in fact all datacenters, are highly lucrative targets for most cyber-criminals.
Your datacenter is always the backbone of your business. It does not matter, if you use your datacenter for storage, or disaster-recovery, or for supporting business applications, the vast computational workloads of your datacenter is THE MOST critical resource of whole IT infrastructure your company operates with.
In the hindsight, your company's sensitive information and business-critical applications are a treasure trove of opportunity for hackers and other threats.
Whether you believe or not, your datacenter is a trusted component of your organization’s infrastructure. Your company is depending upon your datacenter assets to provide a SAFETY NET when everything else goes wrong. That's why the security of your datacenter is extremely vital.
In a way, a secure data center ensures the 'Business Continuity' and gives your company a confidence that you can focus on growing your businesses without worrying about the safety of your digital assets.
-
How Can You Secure Your Datacenter?
Read more: What is Datacenter Security? How Can You Secure Your Datacenter?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is ICS?
ICS is actually a class of some digital devices....
There are number of digital devices which are used in modern 'INDUSTRIAL' processes.
Whether it is your Critical Infrastructure at nation-level (e.g., Power Grid, Water Treatment, Dams, Railways, etc) or your own manufacturing unit or many other large applications, they are using the following types of devices:
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

If you ask me, What is Hacking...
I would say that it is possibly an act of 'compromising' networks and digital devices though UNAUTHORIZED access to a computer system or an user account. But it does not necessarily need to be malicious only.
The general impression of the word is that it is illegal activity and results in data theft by cyber criminals, as they misuse devices, e.g., computers, smartphones, tablets and networks to cause damage to organisations, or to corrupt systems, gather users information, steal data and documents, or to disrupt data-related activities. This makes people imagine that there is a lone rouge programmer who is highly skilled in coding and modifying computer hardware/software.
However, this view is too narrow. Because it does not let them think of the true technical nature of hacking as a SKILL. There is a very high degree of skills involved into it, as hackers are capable of launching highly sophisticated attacks using various stealthy methods which are designed to go completely unnoticed by network security software and IT professionals. Hacking by it very nature, is a multibillion-dollar industry with extremely sophisticated and successful techniques.
Sometimes, there are politically motivated hackers—or hacktivists too, who aim to raise public attention by leaking sensitive information, such as Anonymous, LulzSec, and WikiLeaks.
Here are 2-strange facts about illegal hacking (Source: Fortinet):
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Just suppose you join a new company and they provide you a username and password (plus, MFA) to access their dashboard. When you enter your login credentials, you are presented with a dashboard. What you see at your dashboard is an assortment of so many applications which you can use, e.g., Salesforce, Gmail, Box, Expensify, Jira, AWS, etc.
You would know by your own experience that each of those applications should require you to enter separate user login credentials. But here in your dashboard, when you click on any application, you access it directly and the corresponding interface opens right in front of your eyes, without asking you to enter any login username or password of sorts of things.
You would be wondering, "What's the hack?"
Nothing. It's SAML in action...
-
What is SAML?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Very much like our world where some people strive for peace and others who strive for chaos around, our cyber world 'Internet' is also a grave battle-field. So many parties, nation-states, and people are constantly engaged in cyber-warfare against each other.
The ever-persistent cyber-warfare, forced Information Security guys to hunt for some ideas and they picked one idea from 'Military' terminology, i.e., DMZ (Demilitarized Zone). The demilitarized zone is an area that sits between two areas controlled by opposing forces or nations.
In military terms, a DMZ is a place in which two competing factions agree to put conflicts aside to do meaningful work. For example, a land strip like this, separates the Korean Peninsula, keeping North and South factions at bay.
-
What is DMZ Network?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

A firewall is a device which has the capability of protecting company's computers, servers, systems and the critical assets from all sorts of threats.
It can be a single device or a combination of systems that is capable of supervising the FLOW of traffic between distinctive parts of your network. A good firewall is capable of protecting your systems and network from external threats, but also from the internal threats. Of course, you need protection at each level of the hierarchy of your networking systems.
A firewall is a device or a combination of systems that supervises the flow of traffic between distinctive parts of the network. A firewall is used to guard the network against nasty people and prohibit their actions at predefined boundary levels.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Let us assume that you are using an anonymity or privacy service...
It is extremely important for you that all the traffic that is originating from your computer/laptop is routed through the anonymity network (VPN). You would usually take this aspect granted...
What if your traffic is leaking outside of the secure anonymity network (VPN)?
If it is happening, then any adversary who is monitoring your traffic will be able to log all of your online activity. And, it is a nightmare!
-
What is DNS Leak?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is AAA?
Here AAA stands for Authentication, Authorization, and Accounting.
AAA is a security framework that controls access to computer resources, enforces policies, and audits usage. The combined processes of AAA framework play a major role in your network management and cybersecurity, by screening users and keeping track of their activity while they are connected to your network.
You whole Identity And Access Management (IAM) is the product of this framework.
Read more: What is AAA Framework? Importance of AAA to Network Access Control.....
- What is Data Governance? What are fundamental principles of Data Governance?
- What is an Attack Vector? Different Types of Attack Vectors.....
- What is DevSecOps? How is it Different from DevOps?
- What are IOCs? What are 15-Indicators of Compromise?
- What is Point-of-Sales (POS) Security?
- What is Deception Technology? Honeypots Vs Deception Technology
- What is COBIT? Why is COBIT 2019 Important for You?
- What is Spam-Filtering? How do Spam-Filters Actually Work?
- What is a Ping Of Death? What can you do to Prevent Ping Of Death?
- What is Data EGRESS? 6-Best Practices to manage the menace of Egress.