Cyber Security

What is Vulnerability Management?

According to NIST, vulnerability management is a security practice that is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. The expected result is to reduce the time and money spent dealing with vulnerabilities and the exploitation of those vulnerabilities. Vulnerability management is generally defined as the process of identifying, …

What is Vulnerability Management? Read More »

What is AAA in Cybersecurity?

The Authentication, Authorization, and Accounting (AAA) protocol provides the necessary framework to enable scalable access security.The framework is designed to control who is allowed to connect/access network resources, what they are allowed to do when they are connected, and keeps track of who logged in and what they did while logged in. The AAA framework …

What is AAA in Cybersecurity? Read More »

Infinix Launches Infinix Smart 6

Infinix has just launched the Infinix Smart 6 a budget-friendly smartphone with mid-range specifications. Infinix Smart 6 features a display of 6.6-inch HD+ (1600 x 720 pixels) LCD screen with a waterdrop notch with a Glass front, plastic back, and plastic frame with 500 nits of brightness. Powered by a 2GHz Quad-Core MediaTek Helio A22 …

Infinix Launches Infinix Smart 6 Read More »

What is a DMZ Network?

In network security, a demilitarized zone (DMZ) functions as a subnetwork on an organization’s network infrastructure that is located between the protected internal network and an untrusted network often the internet. The DMZ is designed where there is one inside interface connected to the private network, and one outside interface connected to the public network. …

What is a DMZ Network? Read More »

The MITRE ATT&CK FRAMEWORK

The MITRE ATT&CK Framework is a collection of techniques used by attackers during a breach. The ATT&CK breaks down the techniques into the following tactics:  Initial Access – Techniques that use various entry vectors to gain a foothold. Footholds gained through initial access may allow for continued access, like valid accounts and use of external …

The MITRE ATT&CK FRAMEWORK Read More »

What is a Security Operations Centre?

A security operations center (SOC), also called an information security operations center (ISOC), is a command center where information security professionals monitor, detect, analyze, and respond to cyber security incidents. The SOC is more like the hub or central collection point for taking telemetry information across an organization’s IT infrastructure for monitoring, analyzing, detecting, and …

What is a Security Operations Centre? Read More »

WHAT IS ENDPOINT DETECTION AND RESPONSE (EDR)

Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a “cyber technology that continually monitors and responds to mitigate cyber threats.” It is an integrated endpoint security solution that is used to detect and investigate and combines real-time continuous monitoring to threats on endpoints devices in response to cyber …

WHAT IS ENDPOINT DETECTION AND RESPONSE (EDR) Read More »

Defense in Depth

Defense in depth also known as layered security, is a cybersecurity strategy used by organizations to secure and safeguard their network, system, and data. The strategy assumes that attackers will try to penetrate the organization’s defenses, so multiple layers of security controls (physical, technical, and administrative) are put in place to detect attackers at every …

Defense in Depth Read More »

National Computer Security Day

Held annually every 30th of November is the National Computer Security Day. A celebration that began in 1988 at a time that computers were becoming commonplace. This Day was created to raise awareness about cyber security issues and ways to keep all electronic devices and data protected from potential threats. Today, the internet and computers …

National Computer Security Day Read More »