The Endpoint Detection and Response (EDR) technology has been there for some time now — even though, only a few organizations have transitioned from the traditional endpoint protection Platform (EPP) and implemented the XDR platform. Over the last few months, I’m assisting a few of our clients who reached out…


Data breaches have now become industry neutral and new normal whether you like it or not, breaches have hit not just one industry like financial services where most of the money lives (the biggest motivation for the cybercriminals) and governments but healthcare, education, and other business sectors as well.

On…


Ransomware attack continues to loom large as a threat, cybercriminals evolving ever sophisticated approaches to target the organizations across industry and government agencies, no one is untouched it’s only a matter of time.

It’s becoming challenging for security & compliance teams to protect the enterprise assets and data from cyber-attacks…


Azure Security Center provides unified security management and advanced threat protection across hybrid cloud workloads.

This Article is focused on Azure Security Center capabilities, its features, how to enable the services to protect the workload and other architecture components. …


According to the recent cloud security report, despite all of the benefits, the cloud still bears challenges — data security risk made it to the top (57 percent) of the list of barriers to faster cloud adoption followed by compliance challenges (26 percent). …


5th generation or 5G is the next generation of wireless technology that represents a complete transformation of telecommunication networks. With the combination of legacy and new technology and infrastructure, 5G is built upon utilizing existing infrastructure and technologies. …


https://www.cisomag.com/a-peak-into-safe-ts-zero-trust-access-solution/

As businesses are transforming to digital leveraging technologies such as cloud, IoT, mobile, AI, machine learning, etc. So to malicious actors are also trying to evolve for new avenues and ways of hacking into the Organizations to exfiltrate data or compromise the state of security. …


https://www.springboard.com/blog/machine-learning-projects/

The threat landscape continues to grow year-on-year with a new type of threat actors — proportionally cybersecurity incidents are growing both in volume and sophistication. 34 percent of breaches are caused by internal actors whereas 69 percent perpetrated by outsiders according to Verizon 2019 Data Breach Investigation Report. The report…

Ajay Kumar

A Cybersecurity Architect passionate about cybersecurity excellence — has authored many articles on security & risk management.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store