Cyber Security

What does a GRC analyst do?

GRC analysts have the responsibility of speaking about security from a business point. Their work is designed to help the organization, bolster its defenses, be in a place to quickly react and handle bad situations, and limit the number of negative consequences and impacts. The GRC analyst fully operates within identify and protect section of …

What does a GRC analyst do? Read More »

NIST Incident Response Life Cycle

The NIST 800-61 revision 2 standard provides guidelines for incident handling, especially for analyzing incident-related data, and determining the appropriate response to each incident. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications. Organizations that need to implement the NIST Incident Response Life Cycle, must first establish a computer …

NIST Incident Response Life Cycle Read More »

What is Vulnerability Management?

According to NIST, vulnerability management is a security practice that is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. The expected result is to reduce the time and money spent dealing with vulnerabilities and the exploitation of those vulnerabilities. Vulnerability management is generally defined as the process of identifying, …

What is Vulnerability Management? Read More »

What is AAA in Cybersecurity?

The Authentication, Authorization, and Accounting (AAA) protocol provides the necessary framework to enable scalable access security.The framework is designed to control who is allowed to connect/access network resources, what they are allowed to do when they are connected, and keeps track of who logged in and what they did while logged in. The AAA framework …

What is AAA in Cybersecurity? Read More »

Infinix Launches Infinix Smart 6

Infinix has just launched the Infinix Smart 6 a budget-friendly smartphone with mid-range specifications. Infinix Smart 6 features a display of 6.6-inch HD+ (1600 x 720 pixels) LCD screen with a waterdrop notch with a Glass front, plastic back, and plastic frame with 500 nits of brightness. Powered by a 2GHz Quad-Core MediaTek Helio A22 …

Infinix Launches Infinix Smart 6 Read More »

What is a DMZ Network?

In network security, a demilitarized zone (DMZ) functions as a subnetwork on an organization’s network infrastructure that is located between the protected internal network and an untrusted network often the internet. The DMZ is designed where there is one inside interface connected to the private network, and one outside interface connected to the public network. …

What is a DMZ Network? Read More »

The MITRE ATT&CK FRAMEWORK

The MITRE ATT&CK Framework is a collection of techniques used by attackers during a breach. The ATT&CK breaks down the techniques into the following tactics:  Initial Access – Techniques that use various entry vectors to gain a foothold. Footholds gained through initial access may allow for continued access, like valid accounts and use of external …

The MITRE ATT&CK FRAMEWORK Read More »

What is a Security Operations Centre?

A security operations center (SOC), also called an information security operations center (ISOC), is a command center where information security professionals monitor, detect, analyze, and respond to cyber security incidents. The SOC is more like the hub or central collection point for taking telemetry information across an organization’s IT infrastructure for monitoring, analyzing, detecting, and …

What is a Security Operations Centre? Read More »

WHAT IS ENDPOINT DETECTION AND RESPONSE (EDR)

Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a “cyber technology that continually monitors and responds to mitigate cyber threats.” It is an integrated endpoint security solution that is used to detect and investigate and combines real-time continuous monitoring to threats on endpoints devices in response to cyber …

WHAT IS ENDPOINT DETECTION AND RESPONSE (EDR) Read More »