A Comprehensive Guide to Securing the Supply Chain
In today’s digital age, securing the supply chain has become more critical than ever. Cyber attackers are constantly looking for ways to breach the supply chain and steal sensitive data, manipulate transactions, and cause disruptions. Therefore, businesses must take proactive measures to protect their supply chain. In this article, we will explore the targets of hackers, common attack techniques and trends against the supply…Continue Reading
OT vs IT: Understanding the Differences
Operational Technology (OT) and Information Technology (IT) are two distinct domains that differ in their purpose, infrastructure, and security requirements. IT deals with data processing, storage, and communication technologies that are used to manage and support business operations. On the other hand, OT deals with the hardware and software systems that control and monitor physical processes such as manufacturing, energy production, transportation, and building…Continue Reading
The Booming Ransomware Economy: A Growing Threat to Business
Ransomware attacks have become one of the most significant threats to individuals, businesses, and governments around the world. Cybercriminals use ransomware to encrypt victims’ files and demand payment in exchange for the decryption key. In recent years, the frequency and sophistication of these attacks have increased, resulting in significant financial losses for victims and driving the growth of a thriving ransomware cybercrime economy. The…Continue Reading
Exploring the Use Cases for ChatGPT in Cloud Computing
ChatGPT, a large language model developed by OpenAI, has numerous applications in cloud computing. As businesses increasingly adopt cloud computing, the need for intelligent and flexible tools to manage cloud-based environments is becoming more crucial. In this article, we will explore some of the use cases for ChatGPT in cloud computing. Cloud Service Management ChatGPT can be used as a chatbot for cloud service…Continue Reading
Ransomware Readiness Can Reduce Costs
Cybersecurity is a top priority for businesses of all sizes in today’s digital age. With the ever-increasing number of cyber threats, it is becoming more important than ever to protect your business from potential attacks. One of the most significant threats facing businesses today is ransomware, a type of malware that encrypts a victim’s data and demands payment in exchange for the decryption key.…Continue Reading
The Evolution of AI Security Tools: From Novelty to Necessity
Artificial intelligence (AI) has been one of the most significant technological advancements of the 21st century. In the realm of cybersecurity, AI has played a critical role in the development of new and innovative security tools designed to help organizations protect their networks and data from cyber threats. In this article, we’ll take a closer look at the evolution of AI security tools and…Continue Reading
Cyber Security Tips for SMBs
Cyber attacks are a growing threat to small and medium-sized businesses (SMBs). In fact, according to a recent report from the Ponemon Institute, SMBs are now more likely to be targeted by cyber criminals than larger businesses. There are a number of reasons why SMBs are more vulnerable to cyber attacks. SMBs often have less resources than larger businesses, which means that they may…Continue Reading
Some Thoughts About Future of SOCs
Cybersecurity is one of the most important issues facing businesses today. With the rise of data breaches and other cyber attacks, it is more important than ever to protect your business from these threats. One way to do this is by implementing a security operation center (SOC). A SOC is a centralized location where you can monitor and manage your cybersecurity operations. SOCs play…Continue Reading
Artificial Intelligence and the Future of Work
With the industrial revolution, labors experienced a great deal of fear that machines would take their place. We seem to experience a similar situation in the not too distant future due to Artificial intelligence (AI). AI is changing the way we live and work and its impact on the jobs is no exception. In the field of security, we can see the development of…Continue Reading
Network Detection and Response
As organizations, and security teams, we purchased many security devices for providing both network and endpoint security. However, attacks continue at the same pace, even we faced bigger attacks last year, and they are getting more sophisticated. So, what is the next step for organizations? NDR market guide was shared last year by Gartner. As the idea, NDR uses (or must use) artifical intelligence…Continue Reading
CSA Announced Their 50 Trusted Providers
The Cloud Security Alliance (CSA) announced the selection of a first round of “trusted providers” for cloud security. CSA, a dedicated organization for defining best practices for cloud security, assumes that these trustmarks (will be displayed on each organization’s Security, Trust, Assurance and Risk (STAR) registery) will assist customers in identifying cloud providers that demonstrate their commitment. There are some criteria that companies must…Continue Reading
A Sad Story: Don’t Invest, Just Prodigalize
Last week, a friend called me, gave some bad news about a company. The company was looking for help since they became a victim of Egregor ransomware and trying to learn what to do against attacker since the attacker got their all data, encrypted it and gave three days to be paid 500k dollars. The attacker threatened them to publish their data in public…Continue Reading
Third Party Connections’ Security
Do you want your partners trust you directly? Well, do you trust your third party partners directly? When adversaries are in, they always check different ways to reach more places. So, if one of your trusted third party connection got hacked, it means that there is just a short time they find your connection, and get inside if you did not make your connection…Continue Reading
Host-Based Firewalls – A Possible Nightmare for IT Pros
With increasing remote workforce process during Covid-19, clients are now more independent with their laptops and mobile phones that also being used for personal usage besides organizational usage. Not only workers, but also computers and data are now outside the organization and most of the protection layers such as firewall and IPS. Vulnerabilities and attacks continue to surface but remote users’ connection and VPN…Continue Reading
“MUST” Practices for AntiVirus
Last week, I hearth that an organization did not add antivirus agent to their PC image. They are formatting the PC with their image, then connecting to the network and waiting for the sccm installing the antivirus software to the PC. Also, for remote users working on the field, some contracted partners are formatting the PCs since these users cannot come to the company,…Continue Reading
Email Security – A Buyer’s Guide
All IT professionals know that most of the cyber attacks begin with an email. Actually, according to statistics of Phishme Defense Guide 2017, 91% of cyber attacks began with an email. It is not surprise, since all we know that the human is the weakest part of cyber defense. If the users have not enough awareness – this might be the IT professionals’ fault…Continue Reading
Is DLP Dead?
DLP is a technology we use more than one decade. The starting point of DLP was protecting IP (Intellectual Property) of the organizations and became very popular for too many sectors. Organizations spent, and still spending millions of dollars for DLP solutions, to protect their private data. However, Gartner says; “They become an annoying or toothless technical control rather than a component in a…Continue Reading
Fall of A Hero – Rise and Fall of AV
All IT Security experts surely faced with such situations that anyone who does irrelevant with security, know only AV about computer security. AVs was the hero of our security for long times. Legendary TimesAVs begin their advanture as signature based protection against known viruses and worms. With the development of the threats; fisrtly with script kiddies, than financially motivated hacker groups, it was enough…Continue Reading
A Guide to Choose EDR
As spoken in all security events in last decade, the attacker’s purposes and methods have changed greatly and become more complex. As if this is not enough, increase in the number of the mobile devices used in the organizations and moving some (or most of the) services to cloud made endpoints’ protection more difficult. With the expanded cloud usage and development of the mobile…Continue Reading