Eliminate common Cyber Security Threats
Use 15 Cyber Security Threat Modeling steps
Microsoft Sentinel formerly known as Azure Sentinel, is a technology I came into contact with when I was working on a security project for a client who had a predominantly Azure based cloud...
When I started working in Cyber security, one of the terms I heard a lot of, was Splunk. I was intrigued to find out more about this, as it seemed to be something that could help me advanced my...
Although improvements in technology have many advantages, it has also provided a channel for increased cybercrime. Therefore, to avoid falling victim, companies are investing heavily in security...
Organizations spend a lot of money and resources to protect themselves from cyber attacks and threats. One of the ways they do this, is by using specialist security tools like IDS and IPS, that can...
Most people find it challenging to distinguish between cybersecurity and cryptography, especially since both are systems designed to deal with cybercrime. It is vital to understand and differentiate...
With the rising number of applications and the rise in security threats, the need for Runtime Application Self-Protection (RASP) is ever more important. The security and privacy protection for...