Open in app

Sign In

Write

Sign In

Binu Panicker
Binu Panicker

3 Followers

Home

About

1 day ago

The Anatomy of Ransomware

Ransomware is a type of malware (malicious software) used by cybercriminals. If a computer or network has been infected with ransomware, the ransomware blocks access to the system or encrypts its data. Cybercriminals demand ransom money from their victims in exchange for releasing the data. To protect against ransomware infection…

Ransomware

4 min read

The Anatomy of Ransomware
The Anatomy of Ransomware
Ransomware

4 min read


3 days ago

Zero Trust Network Access (ZTNA)

VPN related organizational attacks and breaches are on the ascent, resulting in the adaptation of newer strategies for securing an organization’s networks and cloud systems. Consequently, two thirds of organizations worldwide are adopting something new; it is what is known as a Zero Trust Network Access (ZTNA). The idea of…

Cybersecurity

7 min read

Zero Trust Network Access (ZTNA)
Zero Trust Network Access (ZTNA)
Cybersecurity

7 min read


3 days ago

The Future of Network Security in the Cloud

Secure Access Service Edge (SASE) is a security framework that provides a single cloud-based platform for the transformation of security and network connections into a secure and rapid cloud transition. The network and network security convergence of SASE addresses digital transformation, advanced computing, and mobility of employees. As businesses strive…

Cybersecurity

5 min read

The Future of Network Security in the Cloud
The Future of Network Security in the Cloud
Cybersecurity

5 min read


4 days ago

Boosting Data Security with AI and Blockchain

Today, data is considered the new oil and rightly so because the amount and type of data collected on people and systems is so vital not only to organizations but also to attackers. As companies become more competitive, the responsibility to protect personal, intellectual and financial data about themselves and…

2 min read

Boosting Data Security with AI and Blockchain
Boosting Data Security with AI and Blockchain

2 min read


4 days ago

Securing CI/CD

There are many organizations moving to the cloud every day. Some are developing software at a fast pace, some are building environments using infrastructure-as-code, and many have vulnerable gaps in the system that will eventually be exploited. These missteps, which can be reduced in the secure software development life cycle…

Cicd

2 min read

Securing CI/CD
Securing CI/CD
Cicd

2 min read


Dec 19, 2022

What to expect in 2023: A Look at 7 Cybersecurity Predictions

As we move closer towards the future, the importance of protecting ourselves from malicious cyberattacks grows more and more every day. With technology rapidly changing, it’s hard to predict what the cyber landscape of 2023 will look like. …

Cybersecurity

3 min read

What to expect in 2023: A Look at 7 Cybersecurity Predictions
What to expect in 2023: A Look at 7 Cybersecurity Predictions
Cybersecurity

3 min read


Nov 18, 2022

Can SOAR Help You Improve MTTD and MTTR for Security Incidents?

MTTD and MTTR are two important metrics when it comes to measuring the performance of your Security Operations. But what are they? MTTD stands for Mean Time to Detection and MTTR stands for Mean Time to Resolution. …

Security

3 min read

Can SOAR Help You Improve MTTD and MTTR for Security Incidents?
Can SOAR Help You Improve MTTD and MTTR for Security Incidents?
Security

3 min read


Oct 26, 2022

What’s the difference between XDR and SOAR and which one is right for you?

In the world of cybersecurity, there are a lot of acronyms thrown around. Two of the most common ones you’ll hear are XDR and SOAR. But what do they stand for? And more importantly, what’s the difference between them? XDR, or Extended Detection and Response, is a security solution that…

Cybersecurity

2 min read

What’s the difference between XDR and SOAR and which one is right for you?
What’s the difference between XDR and SOAR and which one is right for you?
Cybersecurity

2 min read


Sep 4, 2022

How to keep your WordPress site safe from security risks

As a WordPress user, it’s important to be aware of the various security risks that come with using the platform. While WordPress is a secure platform, there are still a few key things that you need to be aware of in order to keep your site secure. …

Word Press

3 min read

How to keep your WordPress site safe from security risks
How to keep your WordPress site safe from security risks
Word Press

3 min read


Aug 29, 2022

What is OSINT and how can a SOAR help with that?

If you’re not familiar with the term “OSINT”, it stands for “Open Source Intelligence”. In a nutshell, it’s any intelligence that can be gathered from public sources. So, how can a Security Orchestration and Automated Response (SOAR) help with OSINT? Well, a SOAR can automate the collection and analysis of…

Osint

2 min read

What is OSINT and how can a SOAR help with that?
What is OSINT and how can a SOAR help with that?
Osint

2 min read

Binu Panicker

Binu Panicker

3 Followers

Security Threats Uncovered.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech