Log Management Best Practices
Log management is a critical process that enables organizations to collect, store, and analyze logs generated by various systems, applications, and networks. However, effective log management requires more than just collecting and storing logs. It requires organizations to follow best practices to ensure the accuracy, security, and usability of logs.Read More
The importance of log management and analysis
Log management is a crucial process that involves collecting, storing, and analyzing logs generated by various systems, applications, and networks. These logs contain vital information about events, actions, and transactions that occur in an IT environment. Effective log management can provide significant benefits to organizations, including improving system performance, troubleshooting,Read More
How do cyber criminals hack into corporate networks despite having firewalls, IDS/IPS, and AV/EDR ?
Almost all the organizations heavily rely on Firewalls, Antivirus and EDRs for the security of their digital assets and still become victims of cyber attacks. Many people reach out to us saying they had firewalls, IDS/IPS, AV/EDR, still some hackers managed to get inside their corporate network and now allRead More
Thailand’s Personal Data Protection Act (PDPA) was finally approved in February 2019 by the Thai National Legislative Assembly, after several legislative attempts. The PDPA was published in the Royal Thai Government Gazette following the passage of the bill, and came into effect on May 28, 2019. Organizations now have oneRead More
The Personal Data Protection Bill of India (PDPA).
The proposed Personal Data Protection Bill 2019 led last week to intense discussion on the exemption it gives the State for its activities In contrast to this controversial position, the private sector is also closely monitoring the new law, as data has become a company’s most important asset today. TheRead More
Coronavirus & Cybersecurity
We all know cyber-crime is growing rapidly but since the inception of covid19 the cyber-crime took a massive jump and various industry sources say that just within the past 4 week cyber threats have grown by 800%. We are in a time where cybersecurity can not be ignored at all.Read More
On April 19, 2020 big IT giant cognizant announced that they have a massive ransomware attack. The official sources said that the organization has been hit by “Maze ransomware” and this has resulted in service disruption to some of it’s clients. Ransomware is one the most serious cybersecurity problems for businesses. WhenRead More
Businesses nowadays increasingly find themselves targeted by phishing emails or scams. Cyber criminals send phishing emails to organization’s employees to get confidential information or sensitive data or to deliver a ransomware payload. Attackers send attached malicious payloads with emails and the moment the user downloads the attached malicious files, allRead More
The evolution of cybersecurity : zero to zero trust network.
Computers, networks, software, data are now integral part of every business irrespective of their revenue and size. From a startup to a big billion organization, every business relies on computing systems to function with the pace of the modern world. But with the evolution of IT and automation; a businessRead More