SOC-AS-A-SUBSCRIPTION I would like to proudly introduce to you SOC-AS-A-SUBSCRIPTION services from our organization. Now you don’t have to spend millions of dollars to setup and design… Read more “SOC-AS-A-SUBSCRIPTION (Security Operation Center) available now !!”
Corporate Cyber Security process, Governance and technology need to be enforced.
Be vigilant, cautious, afraid and be unsafe to encounter unknown risk.
Never get Curious or have the desire to know and venture into unknown territory in this darkening web world. So many social engineering method are being tested… Read more “Curiosity Will Kill !!”
Cyber Question of the month ? 1) How much are you #CyberAgile in your CyberSecurity Initiative? 2) How much of Technology toughness have you validated against the… Read more “Pen Test ? Penetration Test ? DO I NEED ONE !! #cyberAGILE #CyberSecurity”
WPA2, a protocol that secures all modern protected Wi-Fi networks, both personal and enterprise, was recently discovered to be seriously vulnerable to a Key Reinstallation Attack, otherwise… Read more “KRACK: Your Wi-Fi is no longer secure”
I am writing again on cyber-security as I personally feel this is the topic which each organization should really consider for strategic risk mitigation. Lately I came… Read more “in my eyes – CYBER-SECURITY is SECURITY in CYBERWORLD”