
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Here I have shared with you a post that will give a bird's eye view of the key activities performed by Security Analysis.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A cyber security risk assessment is the process of identifying, analysing and evaluating risk. It helps to ensure that the cyber security controls you choose are appropriate to the risks your organisation faces.
Risk assessment is a process that includes:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is the next generation of WiFi security
Protecting Wi-Fi from hackers is one of the most important tasks in cybersecurity. Which is why the arrival of next-generation wireless security protocol WPA3 deserves your attention.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There are many types of cyber attacks. The most common are as follows:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The best method for ensuring your enterprise web apps are secure is to build them with security architecture in mind. And the best way to do that is to cultivate a development security operations (DevSecOps) culture.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Data encryption is what happens when you take the text or data you use and convert it to a code (also called “ciphertext”) that can’t be understood by those who do not have the correct key. For the data to be useable, it must be changed back or decrypted.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If you have been following banking, investing, or cryptocurrency over the last ten years, you may be familiar with “blockchain,” the record-keeping technology behind the Bitcoin network.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Packet filtering is a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
I was glancing over IBM's cybersecurity services and was reading something about how do they power the endpoint protection at the level of an enterprise.
Their approach is that --Threat defense starts with around-the-clock prevention, detection and fast response. And, early detection of any attack or malware depends on intelligence.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
We see that online frauds are increasing day by day, that's why online users need for protection against fraudsters is also increasing, but not many solutions are coming.
As I see it, Adaptive Authentication is augmented and enhanced approach to ensure that sensitive online operations--such as data access, financial transactions, business processes etc-- remain secured. We all use user login & passwords credentials everyday. But we need more robust systems, which guarantee us that our transactions, operations are highly secured from the word go. Adaptive authentication does exactly that, because it provides and uses real-time RISK analytics, risk-based authentication. It also uses anti-phishing, and anti-malware capabilities.
- Inventory and Control of Hardware Assets
- Some of Best Practices to Mitigate Web Security Vulnerabilities
- What is Required to Become a Vulnerability Assessor?
- Top 10 most common database security vulnerabilities
- 2-Most Critical Functions of An SOC
- Situational Awareness in Cybersecurity
- Layered Cybersecurity is must for prevention of attacks
- Bluetooth Security: What should you know to keep yourself SAFE?
- The Importance of Network Traffic Analysis in Threat Detection and Response Programs
- Introduction to Proxy Servers