>
The History of Cybercrime Image

The History of Cybercrime

When do you think the first cybercrime was committed?? When do people first start using personal computers or when they go online? The answer is neith...
Security First: Black Friday & Cyber Monday Shopping Image

Security First: Black Friday & Cyber Monday Shoppi

As attacks become more sophisticated and intelligent, shoppers need to be more careful when searching for the latest discounts online. That’s why foll...
How Does SOAR Differ from SIEM? Image

How Does SOAR Differ from SIEM?

SOAR (Security Orchestration, Automation, and Response) is the terminology adopted by Gartner and is an approach to security operations and incident r...
What Makes a Next Gen SIEM? Image

What Makes a Next Gen SIEM?

Since SIEM is a mature technology now, the next generation of SIEMs shall provide new capabilities and open big data-based architecture. So, what exactly makes SIEM the next generation?
Things That You Need to Know About Password Security Image

Things That You Need to Know About Password Securi

While most people have heard of the basics of password security at some point, the majority still ignore the advice about password security. Since usi...
Types of DDoS Attacks Image

Types of DDoS Attacks

Over the years, cybercriminals have developed a number of technical approaches to eliminate online targets via DDoS. An attacker may use one or more d...
A Day in The Life of A SOC Analyst Image

A Day in The Life of A SOC Analyst

The term “cyber security” is of paramount importance for nearly all the organizations where there is a dedicated information system infrastructure and...
What is Vulnerability Assessment and Penetration Testing (VAPT)? Image

What is Vulnerability Assessment and Penetration T

VAPT is used to search for any possible loophole and weakness of the system and make sure that the system is secured.

Tags

About Blog

Check our guides to be familiar with our products and services
LinkedinFacebookTwitterInstagram