cybersecurity events 2020

Cybersecurity Events to Attend Virtually for the Last Quarter of 2020

The novel coronavirus has undoubtedly changed the world. Equip yourself with crucial information on cybersecurity now to protect your organization.

From new practices in cybersecurity to new ways to conduct our business processes remotely, we have experienced major changes this year due to the novel coronavirus. Home offices have become the new norm; as a result, many employees from all around the world use their own devices and WiFi/network to keep up with their work.

Working wherever and whenever has made life much easier for many of us but it has also brought a new set of challenges for cybersecurity professionals: Using personal networks and devices creates some serious vulnerabilities for your organization. 

Continue reading

Indicators of Attack

The Importance and Difference Between Indicators of Attack and Indicators of Compromise

Introduction

The recent headlines attest that no organization is immune to targeted attacks launched by skilled, persistent adversaries. These highly sophisticated attackers gain unprecedented success against large and even well-equipped organizations across the world. The detection of these attacks is a daunting task. However, if you are well aware of the Indicator of Attacks (IoA) and Indicators of Compromise (IoC), then you can resolve issues with better outcomes. In fact, the IoA and IoC are the two methods of detection in the security marketplace.

Continue reading

SIEM features

Must-Have Features of a Modern SIEM

Initially, Security Information and Event Management (SIEM) solutions were readily adopted because of their capability to provide actionable insights into the deep corners of an organization’s network. Legacy SIEM systems helped in understanding when and where security incidents are happening in real-time. Soon enough, these SIEM systems faced an avalanche of false positives, and they required a dedicated team to filter out irrelevant alerts.

Following this, we saw the emergence of next-generation SIEM solutions that provide functionalities and features that were not available with legacy or first-generation SIEM solutions. In this article, we demonstrate the features of a modern, next-gen SIEM solution.

Continue reading

NIST framework

How to Comply with the NIST Cybersecurity Framework

Introduction

Since NIST Cybersecurity Framework is the best solution for better prevention, detection, and response to cybersecurity incidents, various organizations have adopted it to safeguard their IT assets.

The 2019 SANS OT/ICS Cybersecurity Survey spells out the NIST CSF as the number one cybersecurity framework in use today. However, it is imperative to consider that how should we comply with NIST CSF in 2020 and beyond? Here is some help!

Continue reading