Blog

How Online and Offline Data is used to target Organization and their Employees

How Online and Offline Data is used to target Organization and their Employees

Data in online as well as offline were seen as a commodity by legal and illegal actors which makes the data a main target for cybercriminals and tend to play a crucial component in the commission of many cybercrimes, mainly because it is poorly protected and can be obtained illegally. Data breaches can occur offline

Read More
Primer on Microsoft Sentinel

Primer on Microsoft Sentinel

Microsoft Sentinel Microsoft Sentinel is a SIEM (Security Information and Event Management) and SOAR (Security Orchestration and Automated Response) system in the Microsoft cloud platform. Before delving further into Sentinel, let’s see some brief descriptions of SIEM and SOAR. Security Information and Event Management (SEIM) SEIM collects data and query logs across the system. It

Read More
Phishing

Phishing

Phishing is a social engineering attack mostly used by cybercriminals to attack clients for their confidential information. In general, the common details that are commonly asked by cybercriminals are Date of birth of the clients or users Social security numbers Phone numbers Credit card information Home address Password details The attacks may be concentrated on

Read More
Policy Management Lifecycle – what, why, and how

Policy Management Lifecycle – what, why, and how

Reports say that addressing uncertainties is the condition that most organizations aren’t prepared for. But with a Governance, Risk, and Compliance program, it is easier to predict and address uncertainties and act with integrity. The GRC program is created to predict the risks, get prepared for them and protect yourselves from litigation. Over time, organizations

Read More