AWS Cloud Security Vulnerability CSPM

Cloud adoption has increased exponentially over the years. 94% of enterprises use the cloud already. There used to be two main camps of cloud users as below: Cloud users who were skeptical of security of public cloud in the first place. Cloud users who believe that public cloud takes care of all security aspects automatically […]

cyber security

Security and risk folks are constantly trying to improve security without impacting business productivity. It is key to determine which projects will drive most business value while reducing risk. In September 2020, Gartner published their recommendations for Top 10 Security Projects for 2020-21 that security and risk management leaders should focus on. Here is a […]

Understanding the impact and relevance between public vulnerabilities and their weaponization into threats such as different types of malware’s is important to understand the level of investment and the type of focus that is needed for vulnerability management. Setting the Context Often malware is associated with brute force attacks such as compromised credentials to gain […]

  • Posted in Uncategorized
  • Comments Off on Malware and Public Vulnerabilities – Made for each other

Much has been reported, blogged and pod-casted about the recent high-profile cyber security events surrounding Solarwinds. However, for many including myself, there has been a sense of foreboding about such an event for some time now, given the state of third party security. The response from the stakeholders indicate that while this event is still […]

  • Posted in Uncategorized
  • Comments Off on Third party and supply chain security – a different approach
frictionless vulnerability management

Vulnerability assessment and management is a critical piece in the cybersecurity program for any organization. Most organizations perform periodic vulnerability scans. However, traditional vulnerability scanning tools have largely resulted in a painful experience for customers. This is due to multiple reasons as below: Need to install agents or scanner appliances across the fleet These agents […]

  • Posted in Uncategorized
  • Comments Off on Webinar: Proactive ransomware prevention through better cyber hygiene
  • Posted in Uncategorized
  • Comments Off on APJ Webinar: Eliminate your vulnerability backlog using AI driven prioritization

“An ounce of prevention is better than a pound of cure”. Whatever way you quote this age-old adage, its hard to argue against it. So it goes in the cyber security context as well – preventing cyber threats is always going to be better than curing them. For more than a decade now, we have […]

  • Posted in Uncategorized
  • Comments Off on REvil / Sodinokibi: A case for better proactive cyber security
  • Posted in Uncategorized
  • Comments Off on Webinar: Eliminate your vulnerability backlog using AI driven prioritization
Cloud Security Posture Management CSPM

Organizations have increased public cloud usage, as there are obvious benefits (elasticity, pay-as-you-go subscription model, etc.). While adoption across cloud layers (IaaS, PaaS, SaaS) varies across organizations, one thing for sure is that IaaS usage is most prevalent. Organizations end up shifting to the cloud in an urgency and likely with a “lift and shift” […]