Badges
User Activity
16 days ago
Answered a question: When evaluating Critical Event Management (CEM), what aspect do you think is the most important to look for?
Regular Testing and Validation: The system should support regular testing and validation to ensure its ongoing effectiveness. This includes various testing methods such as penetration, load, and failover testing to identify and address any vulnerabilities.
Compliance and…
16 days ago
Commented on How to Implement CEM in Your Enterprise
What are the key performance indicators (KPIs) we should monitor to evaluate the effectiveness of our CEM system?
16 days ago
Commented on How to Manage CEM in Your Enterprise
How frequently should we conduct penetration testing to ensure our CEM system remains secure against evolving threats?
About 1 month ago
Answered a question: When evaluating Threat Modeling, what aspect do you think is the most important to look for?
When evaluating Threat Modeling, prioritize encryption (at rest and in transit), regular patching, and third-party integrations. Ensure these practices follow security standards as per the application industry.
About 1 month ago
Answered a question: Why is Threat Modeling important for companies?
Yes. It's useful if you want to have a strong shift left approachable security controls to detect threats early in the development cycle.
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
Commented on It integrates well with our other solutions
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
Commented on Provides great scanning features and visibility over where data is stored in a particular environment
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
Commented on Commendable and robust data-centric tool
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
Commented on Offers a unified view, supports many data source types, and provides good data discovery
Quick Update: BigID's classifier tuning can be limited in effectively reducing false positives, especially if the data is complex or the algorithms have inherent limitations.
4 months ago
Contributed a review of Rapid7 InsightCloudSec: Enhances security posture with cost efficiency and powerful APIs
7 months ago
7 months ago
Answered a question: What is your primary use case for Microsoft Entra Permissions Management?
Microsoft Entra Permissions Management is a cloud-based service that offers identity and access management (IAM) capabilities. It can be employed as a cloud infrastructure entitlements management (CIEM) solution to gain visibility into user and role activities. The service…
7 months ago
Contributed a review of BigID: Offers a unified view, supports many data source types, and provides good data discovery
7 months ago
Answered a question: What advice do you have for others considering Microsoft Entra Permissions Management?
It was supposed to be CloudKnox when we started implementing this JIT solution for AWS IAM Permissions management, Now, Microsoft bought that too and named as EPM, and with the recent release with SNow integration which can enable give JIT access to AWS accounts via SSO…
7 months ago
Answered a question: Why is Data Security Posture Management (DSPM) important for companies?
Data Security and Privacy Management (DSPM), the practice of storing passwords and secrets in data systems poses significant risks.1. Exposure of sensitive information which can lead to data breaches. 2. Regulatory violations to store sensitive information. 3. Increased…
Projects
About 1 month ago
certpingCertPing is a monitoring and alerting solution designed to track the status and expiration of SSL/TLS certificates. It helps organizations avoid downtime or security risks caused by expired certificates by providing automated alerts and proactive management. CertPing ensures…
Reviews
Questions
7 months ago
Data Loss Prevention (DLP)
Answers
16 days ago
Critical Event Management (CEM)
About 1 month ago
Threat Modeling
7 months ago
Microsoft Security Suite
7 months ago
Microsoft Security Suite
7 months ago
Data Security Posture Management (DSPM)
Comments
About 1 month ago
Data Governance
About 1 month ago
Data Governance
About 1 month ago
Data Governance
About me
Principal DevOps Security Engineer with detailed technical knowledge and hands-on experience in DevOps, AWS, Python, CloudSecurity, Data Security, Cloud Logging, Automation, Build, and Release engineering which enables operations and development teams to deliver code to customers more reliably & securely quickly
Interesting Projects and Accomplishments
About 1 month ago