
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is SD-WAN?
Of course, it is Software-defined wide area networking (SD-WAN). You already know that.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Three major categories of intrusions faced by most organisations are:
1. State-Sponsored Intrusions, around 18-25%
2. Unattributed Intrusions
Read more: WHAT IS BIG GAME HUNTING - Insights into Intrusions

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Some people say that:
Bluetooth technology is dying out!
You don't have to believe them.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Websites, web applications, and web servers are prime cyber-attack targets. It is a well-known fact that all web apps frequently face SQL injection attacks, cross-site scripting (XSS) attacks, and DDoS attacks, etc.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
How Does a DNS Work?
Every time when you type an address of a website into your browser, the following things happen:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Phishing attacks are increasing in alarming numbers...
• In 2020, it was reported 85% of all organizations have been hit by a phishing attack at least once.
• The 2020 Verizon Data Breach Investigations Report found that 67% of cyber attacks begin with phishing, and 22% of all successful data breaches involved phishing attacks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Gone are times, when companies used to have their own large computer networks doing everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters...

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Who is attacking you today?
How did they managed to sneak in your defenses?
How did they get access to all of your corporate secrets?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
8 Steps to Creating a Secure IT Environment


These are the cornerstones of your IT governance. These together determine that -- “What should happen or be done; and how that is going to happen or to be done” of your security posture. These also include developing the big picture of your entire IT infrastructure.
Read more: 8 Steps to Secure Your IT Environment - A Consultant's Perspective

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a Honeypot?
You want to detect the activities of attackers in your networks and analyze their behavior, because it is the cornerstone of network forensics. Honeypot is such an activity which allows you to collect all important data of attackers' activities.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Most people believe that when your company is a small business, then it would be having scarcity of productive capacity, resources and budgets, even if it desires to tighten its information security. My opinion is that it does not have to be...
- Security @ Vendors - It is Still the Weakest Link of Chain..
- What is EDR and How does an EDR work Actually ?
- What Motivates Hackers ? Money ? Secrets ? Fun ?
- What is Certificate Pinning ? How do you pin Certs in Your Mobile Apps ?
- What is Micro-Segmentation?
- What is a vulnerability in Cybersecurity Context and Why is it important to proactively address Vulnerabilities before they are exploited ?
- What can you do to Protect Your Websites ?
- What are the benefits of browsing anonymously and how can you do that?
- CyberSecurity Analytics - How Does MACHINE LEARNING Works With Security Analytics?
- What is PGP? How Does PGP Work?