Author: Ketan Nilangekar

The rationale behind network firewalls was simple: build a moat around the castle to keep out the bad guys and allow only the people you trust, in over the moat. Essentially, protect your internal network from the big bad internet by selectively allowing or disallowing traffic between the two. Perimeter security relies on a set […]

  • Posted in Uncategorized
  • Comments Off on The myth of perimeter security

Overview A recent study reported that it took organizations an average of 197 days to spot a breach and 69 days to remediate it 1. That is a mind boggling 6 months to detect a potentially disastrous event that could have grave consequences to the future of the organization. Manual steps to track vulnerabilities added 12 […]

  • Posted in Uncategorized
  • Comments Off on ServiceNow comes to ThreatWatch

Everyone in the technology industry processing credit card data is familiar with PCI DSS and the associated process to get attested on a quarterly basis from a QSA ( Qualified Security Assessor ). In addition to the quarterly attestation , organizations also have to go through audits both internal and external audits to maintain PCI […]

  • Posted in Uncategorized
  • Comments Off on PCI Compliance : Make it effective and easy with ThreatWatch

One of the previous blogs on this topic provided an overview about vulnerability management for cloud environments using ThreatWatch. As the blog mentioned , there are two essential aspects to be able to meet that objective. Getting alerted when a cloud provider makes new patches available. Adopting a risk based approach towards applying patches and […]

  • Posted in Uncategorized
  • Comments Off on Vulnerability Alerts for Amazon Web Services