
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Every time whenever you walk to a private doctor or into a private hospital, you are leaving behind a large information about yourself there. This set of information is quite important and you do not want this information to be disclosed. Sometime, you may make some personal disclosure to your private doctors, which you don't want to share with anybody else.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
When you decide to use any cloud storage service, you and your employees will be able to log in from anywhere using internet, to upload and retrieve their data.
But all cloud storage providers don't offer the same level of data protection options to you including cloud encryption...

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The idea behind writing this post is to differentiate the Information's Security and Cybersecurity.
I have found that people are still struggling to make a good distinction between these too.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let me be a little specific here...
Cyber criminals actually prefer to go after companies' SHADOW IT ecosystem. Because it is where they find more entry-points to your network. They target more into the software and applications used or installed by your employees, without the approval and/or knowledge of your IT department.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You always want to ensure that only authorized users are allowed to access your systems & resources. Before the issue of authorized access is handled, you have to tackle the issue of 'Authentication'.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Threat intelligence is knowledge if you have it would allow you to prevent or mitigate a large number of cyber-attacks on your organisation. It is a special form of data that is great in giving you the CONTEXT of:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The job of cybersecurity defenders is never completed and all security measures, even if taken together, never guarantee of failing in front of consistent onslaught of attacks. Attackers always find some new point of entry to exploit your systems or network.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Triage?
The word 'Triage' in cybersecurity has been derived from the world of 'Medics' or medicines.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A cyber Security Audit Is a Top-down approach to understanding your organization’s entire security posture. A Robust and extensive audit examines and ensures that the measures, policies, and controls you have in place from a Cyber Security perspective are being followed and are working correctly.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What are CIS Controls?
They are a set of recommended actions for cyber defense that provide 'specific' and 'actionable' ways to stop today's most pervasive and dangerous attacks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What Are Malicious Macros?
You may already know that a macro basically is a written sequence that can imitate your keystrokes and your mouse commands, to automatically repeat some (defined) tasks in applications.
- What is Threat Modelling?
- What is CASB? What are 4-Pillars of CASB?
- What is Deep Packet Inspection? How Can You Use DPI in Security?
- DDoS Mitigation - How Can You Mitigate DDoS Attacks?
- Requirement #10 of PCI-DSS . Why does it Matter a lot ?
- What is MDM? What is the Difference between MDM, EMM and UEM?
- What is IoT Security? What Can you do to secure your IoT Devices?
- SIEM as a Service - 10 Questions to Ask
- Cloud Security - What are the TOP Issues affecting Cloud Security?
- Why are Digital Signatures So Important? How do Digital Signatures Work?