The Endpoint Detection and Response (EDR) technology has been there for some time now — even though, only a few organizations have transitioned from the traditional endpoint protection Platform (EPP) and implemented the XDR platform. …


Data breaches have now become industry neutral and new normal whether you like it or not, breaches have hit not just one industry like financial services where most of the money lives (the biggest motivation for the cybercriminals) and governments but healthcare, education, and other business sectors as well.

On New Year’s Eve, cybercriminals launched an attack on the Travelex network and forced it to shut down the systems for ransom. The perpetrator claims that they gained access to the company’s systems months ago and were able to successfully download 5GB of sensitive customer data — the data includes the…


Ransomware attack continues to loom large as a threat, cybercriminals evolving ever sophisticated approaches to target the organizations across industry and government agencies, no one is untouched it’s only a matter of time.

It’s becoming challenging for security & compliance teams to protect the enterprise assets and data from cyber-attacks. The killing of Iranian IRGC Quds Force commander has taken full cybersecurity space across the industry, government leaders are starting the year on high alert for Iranian cyberattacks retaliating for the U.S military strike that killed the top Iranian leaders.

Most of the cyber-attacks that transpired today start at the…


Azure Security Center provides unified security management and advanced threat protection across hybrid cloud workloads.

This Article is focused on Azure Security Center capabilities, its features, how to enable the services to protect the workload and other architecture components. This is one of the articles wherein I’ll be publishing a series of articles to talk more about Azures security, applying security policies across workloads to limit exposure to security threats and detect and respond to cyber-attacks.

Security Center help protect all Azure and certain on-prem resources through its free & standard tiers to find and fix security vulnerabilities, apply access and application controls to block malicious activity, detect threats using analytics and intelligence, and respond…


According to the recent cloud security report, despite all of the benefits, the cloud still bears challenges — data security risk made it to the top (57 percent) of the list of barriers to faster cloud adoption followed by compliance challenges (26 percent). The finding emphasizes that security teams should reassess their security postures and strategies to address the shortcomings of the security tools to protect the business-critical data.

The recent security breach that happened at Capital One was related to Amazon could environment which raises many concerns about the security risk that every organization faces today having critical &…


5th generation or 5G is the next generation of wireless technology that represents a complete transformation of telecommunication networks. With the combination of legacy and new technology and infrastructure, 5G is built upon utilizing existing infrastructure and technologies. The goal is to meet the increasing data and communication requirements capacity of tens of thousands of connected devices that will make up the Internet of Things (IoT) with ultra-low latency required for critical near real-time communications and faster speeds to support emerging technologies.

5G’s higher speeds, increased bandwidth, and lower latency will advance emerging and evolving technologies like autonomous vehicles, augmented…


https://www.cisomag.com/a-peak-into-safe-ts-zero-trust-access-solution/

As businesses are transforming to digital leveraging technologies such as cloud, IoT, mobile, AI, machine learning, etc. So to malicious actors are also trying to evolve for new avenues and ways of hacking into the Organizations to exfiltrate data or compromise the state of security. Organizations are still failing to prevent successful cyberattacks with the traditional perimeter-centric security strategies which are no more effective.

The recent Breach at IT Outsourcing Giant, in a statement, wrote that “The company has robust internal processes and a system of advanced security technology in place to detect phishing attempts and protect itself from such…


https://www.springboard.com/blog/machine-learning-projects/

The threat landscape continues to grow year-on-year with a new type of threat actors — proportionally cybersecurity incidents are growing both in volume and sophistication. 34 percent of breaches are caused by internal actors whereas 69 percent perpetrated by outsiders according to Verizon 2019 Data Breach Investigation Report. The report further states that 56 percent of breaches took months or longer to discover. Financial gain is the ultimate and the most common motivation behind any data breaches.

It is the fact that the traditional security systems were built to attempt to find the bad guys by searching for known signature…

Ajay Kumar

A Cybersecurity Architect passionate about cybersecurity excellence — has authored many articles on security & risk management.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store