May 2017

Technology Stack for Ransomware Protection

Technology Stack for Ransomware Protection

With Ransomware attacks becoming increasingly frequent, we thought of putting together a list of technologies that can help organizations protect themselves against ransomware attacks. Please note that even though this blog discusses technology measures, this does NOT mean people & process are secondary. There’s no single technology that can protect against ransomware, and for effective… Read More »Technology Stack for Ransomware Protection

Enterprise Mobility Management Program Metrics

8 Key Metrics To Track Your Enterprise Mobility Management Program

While the proliferation of the BYOD trend has been bonus for businesses in terms of cost savings to productivity gains. But for IT departments, security and compliance is a headache as they scramble to catch with the mobility requirements of workforce. Here are some of the key metrics which can help your organization to monitor… Read More »8 Key Metrics To Track Your Enterprise Mobility Management Program

9 Security Metrics for Cloud

9 Key Security Metrics for Monitoring Cloud Risks

Most organizations are using multiple cloud applications daily (by some estimates 100+). These applications need to be closely monitored based on the risk they pose and the purpose they serve. Here are some key security metrics which can help you monitor the use of Cloud Applications (primarily SaaS) within your organization. You can automate the… Read More »9 Key Security Metrics for Monitoring Cloud Risks

Security Metrics for Vulnerability Management

Top 10 Metrics for your Vulnerability Management Program

Security Metrics are essential for quantitative measurement of any security program. Below, we’ve listed some security metrics (in no particular order) which can be used to measure the performance of your Vulnerability Management (VM) program. For demonstrating performance improvements, you can create dashboards / graphs which can show trends over time for some of these metrics.… Read More »Top 10 Metrics for your Vulnerability Management Program