Shadow IT

Below are interesting blogs on Shadow IT Discovery

Maze Ransomware Hits Cognizant

Maze Ransomware Hits Fortune 500 Company Cognizant: What Can We Learn?

It’s not new news but it’s shocking how large enterprises are becoming victims, these are challenging times. Cognizant (A large fortune 500 company) was seen to notify customers of a compromise and more details. This particular ransomware is particularly dangerous as it steals data before encrypting it and next threatens to release it if the… Read More »Maze Ransomware Hits Fortune 500 Company Cognizant: What Can We Learn?

Learn About Saltstake Vulnerability

SaltStack Advisory (Vulnerability, Impact, Remediation)

This blog was authored by Jitendra Chauhan, Head R&D, FireCompass Salk Stack is  A configuration management system. Salt is capable of maintaining remote nodes in defined states. For example, it can ensure that specific packages are installed and that specific services are running. A distributed remote execution system used to execute commands and query data on… Read More »SaltStack Advisory (Vulnerability, Impact, Remediation)

CISO Guide to dealing with stress during COVID19

CISO Guide To Dealing With Stress During Covid 19 Practical Strategies & Tactics

Social distancing, remote working, unstable times, unpredictable futures – we are all battling with one or all these issues in this COVID-19 ridden days.  As security professionals we understand the importance of building a resilient security program which can not only protect but also detect, respond and recover from a security incident. But what about… Read More »CISO Guide To Dealing With Stress During Covid 19 Practical Strategies & Tactics

Top 12 Talks On ‘Red Teaming & Purple Teaming’ from Security Conferences

We’ve often heard security forums end up with the fiery debate on ‘Red Team’ Vs ‘Purple Team’. So, here we’ve put together some top talks from global security conferences that could help you get a hang on the debatable topic 1. Red Team vs. Blue Team on AWS 2. Red Team View: Gaps in the… Read More »Top 12 Talks On ‘Red Teaming & Purple Teaming’ from Security Conferences

(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

We were happy to participate in a community round table organized by CISO Platform Key Discussion Points :  What is Shadow IT? What are the types of Shadow IT? Practical demo using open source tools Controls to manage shadow IT risk Reason Of Risk :  No standardization Unknown risks Security breaches Data leaks Types Of… Read More »(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

Report - Short Guide On Attack Surface Analysis

Download Report – (Short Guide) On Attack Surface Analysis

Discover Your Attack Surface Before Hackers Do Not having real time view of your dynamic attack surface and the risks it is introducing, leaves an organization in the dark and serves as a low hanging fruit for attackers to use this exposed information to fuel their malicious attacks. Report Includes :  Why Your Expanding Attack… Read More »Download Report – (Short Guide) On Attack Surface Analysis

Report-Critical Capabilities For DRP

Download Report – 9 Critical Capabilities For Digital Risk Protection Program

[Report] 9 Critical Capabilities Needed For Digital Risk Protection Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-new… Read More »Download Report – 9 Critical Capabilities For Digital Risk Protection Program

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Anath Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy. Points Covered were: What… Read More »(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See