FORGOT YOUR DETAILS?

The cyber attack kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, red-teaming attack lifecycle and advanced persistent attacks (APTs). In brief, Cyber attack kill chain involves several core stages,

What is Computer Network Defense? Computer Network Defense (CND) is a set of procedure and securing measures that use computer networks to detect, monitor, protect, analyze and defend against network infiltration resulting in service or network denial, degradation and disruptions. CND will acknowledge against an unauthorized activity, for instance within the Department of Defense (DoD)

E-SPIN Integrated Cyber Security Center Facility

World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT),  it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To

Lists of Major Myths in Zero Trust Architecture

Zero trust architecture is focused on what the business needs and to be functionally in organization systems by implementing network-centric date security that provides access to the only person who needs it. In a legacy network, organizations have little to no visibility or control regarding network and data usage, but with a Zero Trust Architecture,

Introduce of Zero Trust Architecture for IT Security

The organization that need to reliably prevent the exfiltration of sensitive data and want to improve their system to defend again modern cyber threats can consider a Zero Trust architecture. This Zero Trust is introduced by analyst firm Forrester Research that alternative architecture for IT security. So Zero Trust, Zero Trust Network or Zero Trust

Benefits of Zero Trust for Business and Security

The organization today operates differently a few years ago. Organizations are increasingly turning away from solutions that secure the perimeter and then trust everything inside and are instead moving to a zero trust security model to protect sensitive resources and data. Under the assumption that a Zero Trust solution dynamically and continually assesses trust every

E-SPIN please to announce for the following latest round of the Immunity CANVAS and SILICA, CANVAS Exploitation Pack update and upgrade for the following related product lines compiled from the various technical resources for easy reading in one go: D2 Elliot Web Exploitation Framework 1.14, August 7 2018 D2 Elliot has been updated with 11

E-SPIN today proudly announce a Free Technology and Solution Requirement Consultancy Services for up to 5 Man Days for per Reseller Partner or End Client Engagement Case to complement ImmuneSecurity SIEM Product - LogInspect for First Quarter in 2013.

Before we can start talking about the concept of cyber business intelligence, we need to understand where IT factors in when BI is in question. Well, it is an integral part of it. In most companies, it is the IT department that is first tasked with collecting data and analyzing it. This is perfectly natural.

Titania shortlisted in the European Smart Metering Solution Provider category for Cyber Security

The European Smart Metering Awards 2013 have been set up in association with the Smart Metering UK & European Summit to recognise excellence in Smart Metering and will acknowledge those that are playing a defining role in moving the industry forwards. The awards will coincide with three conferences taking part over two days (24th and 25th of January

TOP