ARTIFICIAL INTELLIGENCE – GUIDANCE TO CYBER SECURITY LEADERS
www.rasoolirfan.com
August 19, 2023
Consumption of GenAI applications, such as large language models (LLMs), from business experiments and unmanaged, ad hoc employee adoption creates new attack surfaces and risks on individual privacy, sensitive data and organizational intellectual property (IP). This article aims to provide guidance’s to CISOs, security teams on handling GenAI Cybersecurity concerns
See publication
Tags: AI, Analytics, Cybersecurity
Critical Incident Reporting for Critical Infrastructure Act
www.rasoolirfan.com
April 08, 2022
Critical infrastructure organizations in the United states, now require focus to adhere the ‘Critical Incident Reporting for Critical Infrastructure Act‘ (CIRCIA). Managed security service providers has opportunities to support organizations to adhere this act.
See publication
Tags: Business Continuity, Cybersecurity, Security
CSPM ENGINEER – DAY IN A LIFE
www.rasoolirfan.com
July 26, 2021
CSPM engineer ‘day in a life’ will be packed with energy and determination to discover, provide visibility, analyze the context, respond to threats and manage governance.
See publication
Tags: Cybersecurity, Risk Management
MANAGE CONTAINER SECURITY ASSESSMENT SERVICES
www.rasoolirfan.com
June 21, 2021
Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Overall, Docker, Inc. reports that 13 billion image pulls per month from nearly 8 million repositories residing on Docker Hub are being made by more than 13 million developers.
See publication
Tags: Cloud, Cybersecurity, Emerging Technology
ASSESS VULNERABILITY MGMT. PROGRAM MATURITY
Rasool Irfan
February 01, 2021
The health of digital business depends on effective vulnerability and patch management program that keeps the environment immune from cyber attacks and data breaches. IT security leaders must have focus and vision to reduce the attack surface with vulnerability management program.
See publication
Tags: Cybersecurity
CYBER SECURITY TABLE TOP EXERCISE – JUST DO IT
Rasool Irfan
January 16, 2021
The focus of corporate cyber security risks are now being shifted from prevention to enhance detection and incident response readiness – as you can’t stop attacks. Organizational business continuity program should mandate CISO or CIO business units to have TTX periodically to rehearse the cyber security incident response plans.
See publication
Tags: Cybersecurity, COVID19, Business Continuity
Azure Information Protection, Where do I start?
Import from wordpress feed
September 22, 2020
Data classification and protection are today’s biggest challenges Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions that helps to enforce protection policies when in file is created or being changed, enable DLP policies t
See publication
Tags: Cybersecurity, Privacy
Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk
Import from wordpress feed
September 11, 2020
Cloud infrastructure and platform (CIPS) is the combination of both IaaS and PaaS segments into single platform. According to Gartner, The worldwide CIPS market grew 42.3% in 2019 to total $63.4 billion, up from $44.6 billion in 2018. Amazon, Microsoft and Alibaba secured the top three positions in
See publication
Tags: Cybersecurity, Privacy
Microsoft E5 can replace 16 Security vendors
Import from wordpress feed
September 09, 2020
Organizations exploring options to reduce the cost of IT security investments while maintaining the confidentiality, integrity and availability of IT resources. Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendo
See publication
Tags: Cybersecurity, Privacy
Simplify network security with SASE
Import from wordpress feed
September 07, 2020
Gartner predicts, Over the next five years, the market for secure access service edge (SASE) will grow at a CAGR of 42%, reaching almost $11 billion by 2024. Organizations today invested on multiple point network and security products and services across their remote offices, corporate backbone netw
See publication
Tags: Cybersecurity, Privacy
People is the most critical vulnerability in any organization
Import from wordpress feed
July 13, 2020
In this digital era, organizations do have world-class cyber security tools and certified experienced professionals to manage the technology to safeguard from any data breaches. Despite having adequate security controls and enforcement of IT security policies and procedures – we are still witn
See publication
Tags: Cybersecurity, Privacy
Cost effective programs to enhance cyber security immune system
Import from medium.com
July 01, 2020
Organizations are enduring cost reduction initiatives in uncertain times, however security leaders have challenges to keep the business secure from growing cyber breaches. IT security leaders are looking for cost effective security programs that enhance their cyber security immune systems. This arti
See publication
Tags: Cybersecurity
CISO should redefine corporate security strategy
Import from medium.com
June 28, 2020
Evolution of the CISOThe role for CISO has evolved in last two decades, In early year 2000 — organizations require security information officer to focus on regulatory compliance and interaction with external auditors and business stakeholders to define IT security requirements. They coordinat
See publication
Tags: Cybersecurity
Adoption of cloud makes SIEM investments expensive to use, as their cost is driven by the amount of…
Import from medium.com
June 11, 2020
Adoption of cloud makes SIEM investments expensive to use, as their cost is driven by the amount of data that is ingested. What do you think 'Cloud Heavy' customers should rely on for cost effective security event monitoring solution (as alternative to SIEM)
See publication
Tags: Cybersecurity
Social media addiction is injurious to mental health
Import from medium.com
May 10, 2020
In mobile first generations, the global youth population are born connected. According to Reuters Institute India Digital News Report, 68% of smartphone consumers devices to access online news. The traditional forms of news via broadcast media and print media are becoming outpaced by digital platfor
See publication
Tags: Cybersecurity
Mobile applications require self-defensing capabilities
Import from medium.com
May 03, 2020
Software problems begin with errors made by codersDevelopers often lack security expertise and provide weight-age to the business process while developing client side applications such as mobile apps. With increased usage of smart phones and access to wireless internet keeps the application develop
See publication
Tags: Cybersecurity
Zero Trust Assessment tool now live!
LinkedIn
April 03, 2020
Zero-trust principles are an emerging category that has arisen to address the need for organizations to enable secure remote access to applications for employees, partners, and contractors, regardless of where the application resides (on premises or in private or public cloud environments). As more applications migrate to the cloud, this requirement is growing, highlighting the shortcomings of VPN technology in terms of efficient usage of network bandwidth (the issue of traffic “tromboning” through a concentrator in the corporate data center) and, as a result of this tromboning, of user experience
See publication
Tags: Cybersecurity
Digital Businesses Need Tailored Security Solutions and Services
ISACA
June 10, 2019
Many enterprises prefer to outsource their IT security and believe their cyber security operations will be managed well. Security leaders need visibility on what they’re buying and should ask the questions to their MSSPs
See publication
Tags: Cybersecurity