Try our new research platform with insights from 80,000+ expert users

Badges

User Activity

19 days ago
You can use SailPoint Atlas to take identity security to the next level. In SailPoint IIQ, writing a custom connector using the open source framework is a good option.
20 days ago
I would rate this 10 out of 10. You can have pass through Authentication via active directory in SailPoint Identity IQ. Pass through authentication ensures that the credentials are not stored, reducing the risk of exposure. Pass through Authentication offers seamless…
25 days ago
Top ransomware predictions for 2025 Prediction 1: AI-powered social engineering attacks will surge and fuel ransomware campaigns In 2025, threat actors will increasingly use generative AI (GenAI) to conduct more effective social engineering attacks. A top emerging AI-driven…
25 days ago
@BrytonYang  We must have AI-powered zero trust cybersecurity platforms that detects and mitigates even AI-powered threats. I can conclude that we must adopt a zero trust  security architecture in 2025 to prevent AI based threats.
25 days ago
The other important reason is that we can implement AI-based LLMs and the LLM Guardrails like ethical guardrails, compliance guardrails, contextual guardrails, security guardrails and adaptive guardrails to the AI-based Cybersecurity Platforms. AI LLMs is very important to…
26 days ago
The most important reason is that AI-based cybersecurity platforms deliver automated threat detection and threat remediation capabilities. Currently, this is what all companies need.
27 days ago
As per the link below, I believe Google Cloud is priced better compared to Faction Cloud.  https://www.capterra.co.uk/com.. 
30 days ago
@Rivka Alexander   The primary benefit of UEBA is that it allows enterprises to detect a much wider range of cyber threats. Brute-force attacks, DDoS, insider threats, and compromised accounts are just a few categories of threats that UEBA can detect.
30 days ago
UEBA is important for companies because you can achieve advanced threat detection with User Entity and Behaviour Analytics in Microsoft Sentinel.  User and Entity Behavior Analytics (UEBA) is a valuable tool for detecting cyber threats and security breaches. It is…
About 1 month ago
Next-gen SIEM solutions are designed as cloud-native software as a service (SaaS) platforms, providing more elastic scaling and functionality across decentralized, hybrid, and multi-cloud environments in contrast to traditional solutions.
About 1 month ago
For me, I only use EDR like how CrowdStrike Falcon software is sufficient enough to protect IT assets. For additional layer of security, when your IT assets are accessed from the outside Internet, please ensure NAC (Network Access Control) capability is implemented and in…
About 1 month ago
Apart from these, Google Chronicle SIEM is also the best solution for threat hunting and threat detection. We can also use Google Chronicle (Google SecOps) as a SIEM tool and even can be integrated with Mandiant ( third-party tool)  for real-time threat intelligence. Google…
About 1 month ago
Managed security services is utmost important because managed security services are all AI Powered services and these AI Powered services provide the strongest level of security in the Cloud. These Cloud native security services are AI Powered security services like Amazon…
About 1 month ago
Ace Cloud hosting currently has uptime of 99.99% which is only 2 nines of availability. As an improvement, we can say it should have 5 nines of availability with uptime of 99.99999%. 
About 1 month ago
Ace cloud hosting facilitates remote collaboration. It provides robust and secure cloud solutions specific for your business requirements. It simplifies accounting infrastructure with their comprehensive suite of hosting and security services. It has high standards for…
About 1 month ago
Zero trust means never trust and always verify. Zero trust is a security concept where no device or user is trusted. Principle of least privilege means the level of access granted to a particular resource or user is exactly the level of access what they need. Zero trust…
About 1 month ago
Commented on SIEM vs. Firewall
Yes, you do need SIEM even when you have a firewall. Firewall examines the traffic on a session by session basis while SIEM aggregates the logs, analyzes the logs and searches the logs for the relevant data or content that you are exactly looking for.
About 1 month ago
Actually it depends which GCP Services you will be using and the duration of GCP Cloud services you want to use. For clear understanding, you can use the GCP Pricing Calculator which gives you the minimum cost required for your requirement.
About 1 month ago
For me, Microsoft Sentinel is the best threat intelligence platform. You can conduct an end-to-end proactive threat hunting in Microsoft Sentinel. You can also hunt for security threats using Jupyter Notebooks in Microsoft Sentinel. It can also be integrated with the…
About 1 month ago
Yes AWS Secrets manager is bit costlier than AWS Secrets Parameter store. You do need to bear the costs and pricing of AWS Secrets manager when you want your applications to fetch the latest version of the secrets stored in AWS Secrets manager and when you want to achieve…
About 1 month ago
The comparison between Faction Cloud and Google Cloud in terms of cost, reviews, features, integrations, deployment, target market, support options, trial offers, training options, years in business, region, and more can be understood in nitty and gritty details from the…
About 1 month ago
The secure score feature in Microsoft Defender for Cloud improves your cloud security posture (AWS, Azure and GCP). With the secure score feature, security of different cloud solutions can be compared in terms of percentage.
About 1 month ago
Yes, getting Google Cloud certification is worth for a professional growth and is also a demanding certification in the UK Market.
About 1 month ago
Yes, Google Cloud will overtake AWS because Google Cloud is simple and easy to understand. Whereas, AWS Cloud is complex since it has a lot of integrations with third parties and several features integrated as well.
About 1 month ago
AWS Lambda is probably the most mature serverless platform available today due to the amount of time it has been operating. It has proven to be reliable and is capable of handling workloads of various sizes AWS Lambda offers features beyond the basics that can be expected…
About 1 month ago
SIEM is important for companies because SIEM tools collect, aggregate, and analyze volumes of data from an organization’s applications, devices, servers, and users in real-time so security teams can detect and block attacks. SIEM tools use predetermined rules to help…
About 1 month ago
Security Orchestration and Automated Response (SOAR) refers to a collection of software solutions and tools that organizations can leverage to streamline security operations in three key areas: threat and vulnerability management, incident response, and security-operations…
About 1 month ago
As cyber threats grow more sophisticated, SOC as a Service provides real-time monitoring, rapid incident response and continuous threat intelligence, allowing businesses to stay ahead of risks without the significant cost of an in-house team.  SOC as a Service  provides a…
About 1 month ago
I prefer Microsoft Sentinel Over Palo Alto Networks Cortex XSOAR. Microsoft Sentinel is a Cloud native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI. Users report that Microsoft Sentinel excels in Log Management with a score of…
About 1 month ago
An enterprise password manager enables organizations to achieve compliance and eliminate risk by enforcing password security policies and automating generation of One Time Passwords (OTPs) whilst providing the workforce with frictionless and secure access to applications…
About 1 month ago
PaaS (Platform as a service ) is important for companies because this is where your applications are running. Elastic Beanstalk is an example of PaaS which helps to build and deploy applications in the cloud. Other examples of PaaS are Cloud Foundry and Heroku. It is the…
About 1 month ago
Zero trust (never trust and always verify) requires the protection of networks, infrastructure, endpoints, identities, data and apps. As per zero trust strategy, every access attempt could be a potential threat.The Zero Trust model (based on NIST 800-207) includes the…
About 1 month ago
When evaluating AI Powered cybersecurity platforms, the most important aspects to look for include:Centralized visibility,Automated threat detection and response,Intelligent automation,Automated remediation,Automating security best practices, andFollows Zero Trust…
About 1 month ago
Data Governance is important for companies because Data Governance is concerned with how disciplined you are in managing and using the data across the organization. It consists of  Data Ownership, Data Accountability and technical processes, tools and practices.
About 1 month ago
ZTNA is important for companies to secure private applications. In addition, ZTNA (Zero Trust Network Access) restricts access to the particular resources that the devices or users need. We must implement ZTNA in our Cloud Infrastructures to strengthen the Cloud security…
About 1 month ago
AWS marketplace is important for companies because we can get everything to integrate with AWS Cloud inside AWS Marketplace. Currently, Identity and Access Management is in huge demand for the companies from security viewpoint. IAM Health Cloud is a SaaS solution available…
About 1 month ago
At the moment, Google Chronicle suite lacks for real-time threat intelligence. To overcome this, it needs to be integrated with Mandiant. As an improvement, real-time threat intelligence capability needs to be brought in-built in Google Chronicle suite.
About 1 month ago
My primary use case for Google Chronicle suite is threat detection and threat hunting.
About 1 month ago
Google Chronicle Suite is the best to consider. Google Chronicle security is a cloud service that provides the strongest security.  Google Chronicle SIEM is the best solution for threat hunting and threat detection. Google Chronicle SIEM can also be integrated with Mandiant…
About 1 month ago
Microsoft Purview offers seamless integration with Azure and other Microsoft products, extensive data classification, and multi-cloud capabilities. Varonis Platform excels in detailed data access monitoring, comprehensive security features, and compliance management tools…
About 1 month ago
I will prefer Microsoft Purview compared to Collibra because Microsoft Purview will easily govern your data  wherever it resides either on-premises or in the cloud. Microsoft Purview governs your multi-cloud data as well as SaaS Data. Collibra is specially built for on-prem…
About 1 month ago
Microsoft Purview includes unified data governance solutions that help you manage data services across your on-premises, multi-cloud, and software-as-a-service (SaaS) estate. That includes Azure storage services, Power BI, databases like SQL or Hive, file services like…
About 1 month ago
It seems like we can use third-party software for Google Cloud Backup Both the management console and the backup/recovery appliances employ some licensed third-party software. You can download compressed files of these licenses. Third-party licenses used by the…
About 1 month ago
The Cybersecurity Platforms use security services for their data protection and these security services must be AI Powered to provide the highest level of security across the cybersecurity platforms. AI provide intelligent automation for the strongest security providing…
About 1 month ago
The most important to look for when evaluating IaaS is scalability and availability first. Then other factors include security, reliability, performance efficiency, operational excellence, cost optimization and sustainability.

Projects

About 1 month ago
Design of a Google Cloud Landing Zone and its security.
I provided the design of a GCP Cloud landing zone and the decision points for securing a Google Cloud Landing Zone.
25 days ago
Securing Amazon EKS Cluster with containerized workloads.
The objective was to highly secure the containerized workloads running on an Amazon EKS ( Elastic Kubernetes Service) Cluster. 
25 days ago
Securing Microservices applications on a Google Kubernetes Engine (GKE ) Cluster.
The objective was to secure the microservices applications running on a GKE Cluster. I provided the recommendation of deploying Istio and terraform to secure the GKE Cluster. I also recommended to use the CIS Benchmarks to ensure that the GKE Cluster has been securely…
24 days ago
Best Way to securing your code in a code repository.
The best way of securing your code in a code repository is using Amazon Code Whisperer. Amazon Code Whisperer is the only AI Coding Companion for finding and suggesting remediations for hard-to-detect vulnerabilities.
24 days ago
Centralized secrets management
The management was facing challenge to manage the  secrets centrally for their huge and complex on-prem and Cloud environments in the bank. I gave them the solution to use HashiCorp Vault tool for centrally managing the secrets. I recommended the solution that if your use…

Answers

25 days ago
AI-Powered Cybersecurity Platforms
25 days ago
AI-Powered Cybersecurity Platforms
26 days ago
AI-Powered Cybersecurity Platforms
27 days ago
Infrastructure as a Service Clouds (IaaS)
30 days ago
User Entity Behavior Analytics (UEBA)
About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Managed Security Services Providers (MSSP)
About 1 month ago
Managed Security Services Providers (MSSP)
About 1 month ago
Managed Security Services Providers (MSSP)
About 1 month ago
Infrastructure as a Service Clouds (IaaS)
About 1 month ago
Infrastructure as a Service Clouds (IaaS)
About 1 month ago
Infrastructure as a Service Clouds (IaaS)
About 1 month ago
Infrastructure as a Service Clouds (IaaS)
About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Security Orchestration Automation and Response (SOAR)
About 1 month ago
SOC as a Service
About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Enterprise Password Managers
About 1 month ago
Data Governance
About 1 month ago
AWS Marketplace
About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Infrastructure as a Service Clouds (IaaS)
About 1 month ago
AI-Powered Cybersecurity Platforms

Comments

About 1 month ago
Security Information and Event Management (SIEM)
About 1 month ago
Security Information and Event Management (SIEM)

About me

I am multi-cloud security and AI Security Architect with 15 years of global experience in multiple security domains.