Centralization of Security: a Futile Exercise?
… What is right? Sewer Rat or Bubble Boy Let’s talk security with an analogy from parenting. However as a precautionary measure, I would like to declare beforehand that am… Read more »
… What is right? Sewer Rat or Bubble Boy Let’s talk security with an analogy from parenting. However as a precautionary measure, I would like to declare beforehand that am… Read more »
Let us take a break from classical computing which consists of two only states i.e., 0 and 1. The computing spaceship is compelling us to take a detour and understand… Read more »
We, as humans, desire interconnectedness, as much as we seek the solace of seclusion. Intricacies of modern technology and digitisation has fuelled this interconnectedness but, at the same time has… Read more »
…what can the world of Security learn from it The degree of familiarity with the term Platformization may vary across stakeholder groups, but the fact that, in this hyper specialized… Read more »
Transforming SOCs into Cyber Defence centres Rise in cyberattacks and increasing risk to critical infrastructures has been lately plaguing financial institutions, businesses and governments. Today, digitization of business operations, data… Read more »
…the right alternate for you, and nuances associated with it How Imperative EDR is for Organizations? The endpoints are the entry points used by adversaries to compromise an organization, often… Read more »