
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
I have seen that most companies spend significant resources on internal security, for example, vulnerability scans, SIEM, centralized log management, or end-user security awareness trainings, and lot many more things. But they also tend to make a cardinal mistake of not extending the same diligence towards their vendors or third-parties.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What Is EDR and Why Is It Important?
Cybercriminals do their utmost to successfully target and attack your company’s endpoints for various reasons. They might want to exfiltrate your data or hold it for ransom, override your machines, exploit them in a botnet and conduct DDoS attacks, and much more.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
• Do you ever wonder why SOMEONE makes one decision and not another?
• Do you ever catch yourself asking, What were they thinking?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You have downloaded and installed your bank's app on your mobile. You want to make some transection on it. When you try to log into it, it connects with the server of your bank. But how do you know the server it is trying to connect is genuine or not?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
For 20+ years, the FIREWALL used to be considered as the most important device of the networks. Because companies understood the concept of Client-Server model so properly that they would place the 'Firewall' at the perimeter and secure the network from all the data that is coming from the outside.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a vulnerability in Cybersecurity Context?
It can be defined as any mean by which an external threat actor can gain unauthorized access or privileged control to any application, endpoint, server within your IT environment.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is vital for your website to have strong web security if you want to do well in SEO.
We need to understand that Google is focused on not only delivering high-quality, relevant search results, but also on protecting people from malware and unscrupulous websites. Not only that, a hack of your website by others can give Google false information that directly impacts your rankings.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If you are worried about your privacy and don’t want to be tracked by your ISPs, Corporate, Government, Agencies, Hackers, then you are in a need of browsing without letting anybody know about your internet browsing habits.
Read more: What are the benefits of browsing anonymously and how can you do that?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There is no one single way to cybersecurity, because the cyber landscape is ever-evolving, continuously in flux…
Most organizations these days face a wider range and greater frequency of cyber threats than ever before. These threats can be from:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is PGP ?
PGP stands for 'Pretty Good Privacy.' Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP has become the de facto standard for email security.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a VLAN?
A virtual local area network (VLAN) is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices.
- What is LATERAL MOVEMENT in Cyber Attacks? How Can You See If Someone is making LATERAL MOVEMENT in Your Network?
- How are Your Credentials Stolen ? Beware of Password Stealers !
- Defending Against Zero-Day Attacks - Security Vendors' Perspective
- 17 Tips To Stay Safe On Social Media
- What is Patch Management? Is it EASY ?
- What is Cryptojacking and How Does it Work?
- Future of Ethical Hacking - An Update
- A Great Lesson From Data Breach at TARGET Corporation
- Business Email Compromise and What Steps Can You Take?
- The Sanctions Mechanism GDPR and How Can You Improve Your Chances of GDPR Compliance Success?