The History of Cybercrime
When do you think the first cybercrime was committed?? When do people first start using personal computers or when they go online? The answer is neith...
Security First: Black Friday & Cyber Monday Shoppi
As attacks become more sophisticated and intelligent, shoppers need to be more careful when searching for the latest discounts online. That’s why foll...
How Does SOAR Differ from SIEM?
SOAR (Security Orchestration, Automation, and Response) is the terminology adopted by Gartner and is an approach to security operations and incident r...
What Makes a Next Gen SIEM?
Since SIEM is a mature technology now, the next generation of SIEMs shall provide new capabilities and open big data-based architecture. So, what exactly makes SIEM the next generation?
Things That You Need to Know About Password Securi
While most people have heard of the basics of password security at some point, the majority still ignore the advice about password security. Since usi...
Types of DDoS Attacks
Over the years, cybercriminals have developed a number of technical approaches to eliminate online targets via DDoS. An attacker may use one or more d...
A Day in The Life of A SOC Analyst
The term “cyber security” is of paramount importance for nearly all the organizations where there is a dedicated information system infrastructure and...
What is Vulnerability Assessment and Penetration T
VAPT is used to search for any possible loophole and weakness of the system and make sure that the system is secured.