(Report) Top Learnings & Detailed Analysis From COSMOS Bank Breach

(Report) Top Learnings & Detailed Analysis From COSMOS Bank Breach

Recently, you might have heard in news about COSMOS Bank, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. The bank lost INR 940 million (94 Crores) due to this breach on 11th & 13th August. As per reports, the fraudulent transactions were carriedRead more about (Report) Top Learnings & Detailed Analysis From COSMOS Bank Breach[…]

Top Endpoint Encryption Technology Vendors

Top Endpoint Encryption Technology Vendors

Encryption Technology is a process of protecting your sensitive data by converting it into encoded information which could be read only with a key. Endpoint Encryption technology ensures data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Here are Top Endpoint EncryptionRead more about Top Endpoint Encryption Technology Vendors[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 3 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part3)[…]

Benchmarking Web Application Firewall (WAF) Solutions

Benchmarking Web Application Firewall (WAF) Solutions

Today web applications are ubiquitous and in many cases, the primary source of engagement between the user and the organization. Traditionally, organizations relied on network security controls such as network firewalls and IDS/IPS as the primary defence mechanism even for applications, but that is a very flawed approach. Application security requires organizations to rethink theirRead more about Benchmarking Web Application Firewall (WAF) Solutions[…]

Top Emerging Cyber Security Vendors To Look Out For In 2018

Top Emerging Cyber Security Vendors To Look Out For In 2018

Looking for Top Emerging Companies in the Cyber Security Industry?  FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you theRead more about Top Emerging Cyber Security Vendors To Look Out For In 2018[…]

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

What will you learn: Overview of data leakages Cases Risks Solutions Protection against data leakages Main challenges Sources of data leakages Tools and solutions Data Leakage Prevention systems Core principles and technologies involved Layered insider threat intelligence Visualization of information flows Pinpoint control of suspicious activities Mobile environment and insider threats About Speaker:   NikitaRead more about Webinar-Insider Threat Intelligence: Creating A Robust Information Security System[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part2)[…]