Badges
User Activity
Over 1 year ago
Almost 2 years ago
Answered a question: What is the best MSSP for SOC as a Service in the USA ?
When it comes to finding the best MSSP for SOC as a Service in the USA, it's important to consider a variety of factors. First and foremost, you'll want to find an experienced provider that has expertise in providing comprehensive Security Operations Center (SOC) services…
Almost 2 years ago
Answered a question: Which ransomware is the biggest threat in 2020?
In 2020, the most significant ransomware threats is still “WannaCry.” WannaCry is a type of malicious software (malware) that encrypts files on a targeted computer and demands money from its victims in exchange for ransom. It was first identified in May 2017 when it infected…
Almost 2 years ago
Answered a question: What is the difference between Coverity and SonarQube?
Coverity and SonarQube are both popular static analysis tools used for detecting software defects. Static analysis is a form of cybersecurity that can be used to prevent malicious code from entering a system or application, making it an important component of any security…
Almost 2 years ago
Commented on Cybersecurity Trends To Look Out For in 2022
With zero trust, there are no boundaries, and nothing is inherently trusted. While clearly more restrictive, the benefit of the Zero Trust Security model is it creates a far more secure environment that protects against unauthorized access to sensitive data and digital…
Almost 2 years ago
Answered a question: What do you like most about ERPScan SMART Cybersecurity Platform?
I have been using ERPScan SMART Cybersecurity Platform for quite some time and I must say, the platform offers one of the best security measures across enterprise networks. The platform is completely automated and provides customizable detection rules which enable it to…
Almost 2 years ago
Answered a question: What are the threats associated with using ‘bogus’ cybersecurity tools?
Using ‘bogus’ cybersecurity tools can seem like a good idea in the short term, but it can come back to haunt you in the long run. Bogus security tools pose serious threats to your business and personal information because they don't provide the same level of protection as…
Almost 2 years ago
Answered a question: What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
The pros and cons of Darktrace vs Crowdstrike Falcon vs alternative EPP solutions are something worth looking at before making a decision on which one is the best fit for your particular needs
Darktrace is an AI-based cyber security solution that uses machine learning to…
Almost 2 years ago
Answered a question: What is the biggest difference between EPP and EDR products?
EPP (Endpoint Protection Platforms) and EDR (Endpoint Detection & Response) products are both critical elements of enterprise security, with each type offering different value. The primary difference between the two is that EPP products focus on prevention while EDR focuses…
About 2 years ago
Answered a question: What is ZTNA as a service?
ZTNA is a trademarked term for a new type of secure authentication service. It is a cloud-based service that allows enterprises to quickly and easily deploy two-factor authentication for their employees, customers, or partners. With ZTNA, businesses can reduce the risk of…
About 2 years ago
Answered a question: How does pricing work for Microsoft Defender for Endpoint?
Microsoft Windows Defender is a part of Windows 10 and is available at no additional cost. It offers basic protection against malware and viruses. For more comprehensive protection, you can upgrade to a paid subscription to Microsoft Defender Advanced Threat Protection
ADTP…
About 2 years ago
Answered a question: What is Cybersecurity Mesh and how is it related to Zero Trust?
Cybersecurity mesh is a term for security models that use zero trust principles. With a cybersecurity mesh, there is no assumed trust between devices or users, regardless of location or relationship. Every action is verified and authorized, so that even if a hacker has…
About 2 years ago
Answered a question: What are the Top 5 cybersecurity trends in 2022?
1. Proliferation of ransomware and data theft: The use of ransomware will continue to increase in 2022, as will the theft of sensitive data
2. Increased sophistication of cyberattacks: Cybercriminals will become more adept at launching sophisticated attacks that are…
About 2 years ago
Commented on Discovery tools & security - Part 2
There are a number of discovery tools and security applications on the market today. Some of the more popular ones include
- App discovery: Appthority, FindMyApp
- Email discovery: Code Factors, Microsoft Exchange Reporter, ProDiscover TX, SolarWinds MSP Mail Security
-…
About 2 years ago
Answered a question: What is Cognitive Cybersecurity and what is it used for?
Cognitive Cybersecurity is a term used to describe the process of protecting computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves protecting the systems from both external and internal threats. External threats…
About 2 years ago
Answered a question: How Managed Security Services (MSS) secure your organization?
A Managed Security Services provider(MSSPs) is a company that provides security-related services to other organizations. An MSS can provide a variety of services, such as managed firewall services, intrusion detection and prevention, vulnerability scanning, and more
MSSs…
About 2 years ago
Answered a question: Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
There is a lot of discussion on this topic, and opinions vary. Some people believe that using both an EDR solution and an AV solution is the best way to protect your computer, while others believe that using one or the other is sufficient
The truth is that there is no one…
About 2 years ago
Commented on Top 5 Benefits of SIEM
4 Benefits of SIEM that you should know: 1. Empowers Security Operation with Real-time Threat Recognition 2. Enhanced Network Visibility Eliminates “Dark Spaces”3. Protection From Advanced and Unknown Threats 4. Detailed Forensic Investigations Optimizes Threat Response.
Articles
Questions
Answers
Almost 2 years ago
Application Security Tools
Almost 2 years ago
Application Security Tools
Almost 2 years ago
Intrusion Detection and Prevention Software (IDPS)
Almost 2 years ago
Endpoint Protection Platform (EPP)
About 2 years ago
Endpoint Protection Platform (EPP)
About 2 years ago
Managed Security Services Providers (MSSP)
About 2 years ago
IT Asset Management