
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The idea behind writing this post is to differentiate the Information's Security and Cybersecurity.
I have found that people are still struggling to make a good distinction between these too.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let me be a little specific here...
Cyber criminals actually prefer to go after companies' SHADOW IT ecosystem. Because it is where they find more entry-points to your network. They target more into the software and applications used or installed by your employees, without the approval and/or knowledge of your IT department.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You always want to ensure that only authorized users are allowed to access your systems & resources. Before the issue of authorized access is handled, you have to tackle the issue of 'Authentication'.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Threat intelligence is knowledge if you have it would allow you to prevent or mitigate a large number of cyber-attacks on your organisation. It is a special form of data that is great in giving you the CONTEXT of:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The job of cybersecurity defenders is never completed and all security measures, even if taken together, never guarantee of failing in front of consistent onslaught of attacks. Attackers always find some new point of entry to exploit your systems or network.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Triage?
The word 'Triage' in cybersecurity has been derived from the world of 'Medics' or medicines.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A cyber Security Audit Is a Top-down approach to understanding your organization’s entire security posture. A Robust and extensive audit examines and ensures that the measures, policies, and controls you have in place from a Cyber Security perspective are being followed and are working correctly.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What are CIS Controls?
They are a set of recommended actions for cyber defense that provide 'specific' and 'actionable' ways to stop today's most pervasive and dangerous attacks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What Are Malicious Macros?
You may already know that a macro basically is a written sequence that can imitate your keystrokes and your mouse commands, to automatically repeat some (defined) tasks in applications.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
I want you to comprehend one more fact that:
There are vulnerabilities in all software, all hardware, hence in all networks. Perhaps they are never going to be 100% secure. What can you do as a cybersecurity professional is that you can try to keep your systems as secure as reasonably possible. It means that you are always going to encounter some limits, and no security hardening is ever perfect. That's why information security is a constantly evolving, everyday process.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You need to think deep about one fact here that--
Almost all enterprises are embracing the cloud...as THE DEFAULT STARTING POINT...for most of their new projects. They want all of their updates and enhancements to existing applications to happen on the cloud.
- What is Deep Packet Inspection? How Can You Use DPI in Security?
- DDoS Mitigation - How Can You Mitigate DDoS Attacks?
- Requirement #10 of PCI-DSS . Why does it Matter a lot ?
- What is MDM? What is the Difference between MDM, EMM and UEM?
- What is IoT Security? What Can you do to secure your IoT Devices?
- SIEM as a Service - 10 Questions to Ask
- Cloud Security - What are the TOP Issues affecting Cloud Security?
- Why are Digital Signatures So Important? How do Digital Signatures Work?
- Vulnerability Assessment - How to Approach Vulnerability Assessments RIghtly?
- ZERO TRUST, ZTA and ZTNA - What is the Difference?