Posts

Everything You Need to Know about IoT Edge Computing

Image
The number of IoT (Internet of Things) devices circulated today is already growing exponentially and billions of devices are joined to the IoT network while leveraging the power of the cloud. Writing the future of the IoT devices, IoT edge computing has come to the stage addressing latency issues by providing data processing closer to the source. Organizations that manage physical assets can reap tremendous cost savings and unlock new opportunities by switching to intelligent edge computing architectures. In many ways, edge computing is the network architecture that makes IoT possible in the first place. Demanding for high capacity data processing techniques in real-time with a spacious network is the authentic challenge that data scientists and data analysts are facing today. But, no worries anymore! This problem is now taking care of by IoT Edge Computing Technology. What is IoT Edge Computing? According to International Data Corporation (IDC), IoT Edge Computing is a network o

Why an Effective Security Operations Center (SOC) is Essential for Your Organization?

Image
I n this technology-driven world, every business, despite the size, make committed efforts to protect their sensitive data from sophisticated and targeted cyberattacks. The probability of a breach has increased, so does the cost to mitigate them. Organizations are ceaselessly working on finding reliable defensive strategies against cyberattacks. This is the point where a Security Operations Center (SOC) comes to the stage. A Security Operation Center (SOC) is a centralized function within an organization engaging people, processes, and technology to continuously monitor and enhance an organization's security posture while preventing, detecting, analyzing, and responding to anomalous cybersecurity activities. It acts like the hub or central command post, taking in telemetry from across an organization's IT infrastructure such as networks, devices, appliances, and information stores etc. How a SOC Works? A SOC is an example for the software as a service (SaaS) software model whic

Understand the 360 Degrees of Penetration Testing: Why, When and How

Image
Breaking down a company’s security protections required a lot of time and skills a long time ago. However, with today’s technological advances, finding an organization’s loopholes have become a piece of cake for the cybercriminals out there. Enterprise networks are facing non-stop attacks. Your business, institute or organization also can be a target of the cybercriminals in any minute. Ignoring these vulnerabilities can lead to system breaches, loss of personal customer data and affect the reputation of your business at the end of the day. Security and penetration testing is the only way to identify those exposures. So let’s give a break to your curiosity and start talking about “Penetration Testing”. What is Penetration Testing? Penetration testing is a common way for organizations to test their security maturity and identify potential vulnerabilities in a system (ex: application protocol interfaces (APIs), frontend/backend servers), network, or application. Poor architecture des

Let’s Mitigate the Cyber Treats in Video Surveillance

Image
2016 will be remembered as a year in which the physical security industry’s got backfired with their apathy towards cybersecurity with a massive distributed denial of service (DDoS) attack caused outages of influential websites like Amazon and Twitter. If you are familiar with the “Mirai Virus”, you may have a clue on what I am talking about. Mirai is a self-propagating botnet virus, which enters a camera by logging in using one of 61 default or common weak passwords that are capable of flooding any site on the web while still acting like a normal camera. It is estimated as 100,000 devices were hijacked by hackers, including network security cameras in this very incident. Got your attention now? Welcome to today’s focus, “Video Surveillance Cybersecurity”. What are the Potential Vulnerabilities of Your Video Surveillance System? A collection of equipment and software that provides security and safety can simply mention as a physical security system. CCTV (Closed-circuit television)

Are You a Victim of a Ransomware Attack?

Image
Have you ever experienced when you opened your computer to find it had been locked with a ransom note demanding cash immediately? In 2018 Ransomware attack grew by 350%   reaching a total of 812 million infected devices. Leave a small country like Sri Lanka behind. Let's take a powerful country like the United States. The Emsisoft Q1 and Q2 2020 research shows that in 2019 Ransomware attacks against 966 U.S. government, healthcare and educational entities cost $7.5 billion. Scary, right...!? Does your business, institution ready to deal with this cyber threat? Let's begin our journey through Ransomware!!!   Before we start, let's know what a Ransomware is. A Ransomware is simply a type of malware (malicious software) designed to deny access to the files on the user’s device. If you are a user, your computer is attacked by encrypting these files which only the malware operator can decrypt them. Ransomware is categorized into two main types as crypto-ransomware and locker ran