cybersecurity

The People, Process, and Technology of Cybersecurity

The COVID-19 pandemic generated an increase in cyber threats. According to a security magazine, Ransomware attacks rose by 92.7% in 2021 whilst comparison to 2020. With an increase in the use of digital technology comes an increase in cyber threats and with each passing day, such threats are evolving, and the need for constant attention …

The People, Process, and Technology of Cybersecurity Read More »

What is Cybersecurity Risk?

According to NIST SP 800-60 volume 1 revision 1, Cybersecurity risks relate to the loss of confidentiality, integrity, or availability of information, data, or information (or control) systems and reflect the potential adverse impacts on organizational operations (i.e., mission, functions, image, or reputation) and assets, individuals, other organizations, and the Nation. Cybersecurity risk is the probability of exposure, …

What is Cybersecurity Risk? Read More »

What does a GRC analyst do?

GRC analysts have the responsibility of speaking about security from a business point. Their work is designed to help the organization, bolster its defenses, be in a place to quickly react and handle bad situations, and limit the number of negative consequences and impacts. The GRC analyst fully operates within identify and protect section of …

What does a GRC analyst do? Read More »

NIST Incident Response Life Cycle

The NIST 800-61 revision 2 standard provides guidelines for incident handling, especially for analyzing incident-related data, and determining the appropriate response to each incident. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications. Organizations that need to implement the NIST Incident Response Life Cycle, must first establish a computer …

NIST Incident Response Life Cycle Read More »

What is Vulnerability Management?

According to NIST, vulnerability management is a security practice that is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. The expected result is to reduce the time and money spent dealing with vulnerabilities and the exploitation of those vulnerabilities. Vulnerability management is generally defined as the process of identifying, …

What is Vulnerability Management? Read More »

What is AAA in Cybersecurity?

The Authentication, Authorization, and Accounting (AAA) protocol provides the necessary framework to enable scalable access security.The framework is designed to control who is allowed to connect/access network resources, what they are allowed to do when they are connected, and keeps track of who logged in and what they did while logged in. The AAA framework …

What is AAA in Cybersecurity? Read More »

What is a Security Operations Centre?

A security operations center (SOC), also called an information security operations center (ISOC), is a command center where information security professionals monitor, detect, analyze, and respond to cyber security incidents. The SOC is more like the hub or central collection point for taking telemetry information across an organization’s IT infrastructure for monitoring, analyzing, detecting, and …

What is a Security Operations Centre? Read More »