700K Amex Customer Data Exposed: What You Need To Know

700K Amex Customer Data Exposed: What You Need To Know

A recently disclosed data leak impacts around 700,000 AmEx India customers, exposing Personally Identifiable Information (PII) like Names, Emails & Telephone numbers. This leak highlights the perils of Shadow IT, and why organizations should look into building a continuous digital risk monitoring program. Here’s a brief on what you need to know: What Was Exposed?Read more about 700K Amex Customer Data Exposed: What You Need To Know[…]

Microsoft Office Sub-domain Takeover Vulnerability Affecting 400 Million Users

Microsoft Office Sub-domain Takeover Vulnerability Affecting 400 Million Users

Security Researcher Sahad Nk recently discovered a string of webapp vulnerabilities in Microsoft (Office & Live Login System), that could allow an attacker to easily gain access to organizations emails and data on Office. Though individually the vulnerabilities were not severe, but when connected together could lead to critical data loss. Here’s brief overview of howRead more about Microsoft Office Sub-domain Takeover Vulnerability Affecting 400 Million Users[…]

Key Program Metrics for Threat Intelligence (TI)

Key Program Metrics for Threat Intelligence (TI)

Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to any kind of cyber attacks. Threat intelligence as applied in conventional security is  any information that helpsRead more about Key Program Metrics for Threat Intelligence (TI)[…]

Learn More About Managed Security Services (MSS)

Learn More About Managed Security Services (MSS)

Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Provider (MSSP). Key Program Metrics: Service Level Agreements : No of services or service hours charged and numberRead more about Learn More About Managed Security Services (MSS)[…]

Key Program Metrics of  Endpoint Detection and Response (EDR)

Key Program Metrics of Endpoint Detection and Response (EDR)

An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint Threat Detection and Response (ETDR) but it is more popular as EDR. Key Program Metrics: Level of visibility theRead more about Key Program Metrics of Endpoint Detection and Response (EDR)[…]

Key Program Metrics of Distributed denial-of-service (DDoS)

Key Program Metrics of Distributed denial-of-service (DDoS)

Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for legitimate users of the targeted system. The flood of incoming traffic totally overwhelms the system, hence denying service to legitimate users. Key Program Metrics: Loss percentage : number of packets or bytes lost due to the interactionRead more about Key Program Metrics of Distributed denial-of-service (DDoS)[…]

Key Program Metrics of Network Advanced Threat Protection

Key Program Metrics of Network Advanced Threat Protection

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.Read more about Key Program Metrics of Network Advanced Threat Protection[…]

Key Program Metrics of Vulnerability Assessment

Key Program Metrics of Vulnerability Assessment

Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability management program addresses the inherent problem associated with vulnerable software programs. TheseRead more about Key Program Metrics of Vulnerability Assessment[…]

Key Metrics Of Enterprise Mobility Management (EMM)

Key Metrics Of Enterprise Mobility Management (EMM)

Enterprise mobility management ( EMM ) is a suite of products which allows you to safely enable the use of mobile devices in your organization. Employees today want to use their personal devices for checking corporate mails and access sensitive documents as and when they need it, be it inside or outside the corporate network.Read more about Key Metrics Of Enterprise Mobility Management (EMM)[…]

Key Program Metrics Of Next Generation Firewall (NGFW)

Key Program Metrics Of Next Generation Firewall (NGFW)

A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through application specific protocols such as HTTP, HTTPS, SMTP and so on. It also incorporates various network device filtering functionalities such as an intrusion preventionRead more about Key Program Metrics Of Next Generation Firewall (NGFW)[…]