NDR: The latest support of Cyber Security Post author:Sameer Zama Post published:May 19, 2022 Network Detection and Response (NDR) is an expanding field of cybersecurity that enables organizations to monitor network traffic for malicious actors, suspicious behaviour, react and respond to the detection of cyber threats… Continue ReadingNDR: The latest support of Cyber Security
How to Maximize API Security Through Simplicity Post author:Sameer Zama Post published:May 12, 2022 APIs (Application Programming Interfaces) are the key part of digital transformation strategies, and securing those APIs is a top challenge. APIs are a rapidly growing attack surface that isn't widely… Continue ReadingHow to Maximize API Security Through Simplicity
CxSAST: A Complete Application Security Package! Post author:Sameer Zama Post published:April 22, 2021 In 2021, we have shifted everything online with the new ‘Work from Anywhere’ culture that emerged during the global COVID-19 crisis, making applications and software an inevitable and expanding part… Continue ReadingCxSAST: A Complete Application Security Package!
Email Security: Unawareness syndrome might cost you a fortune! Post author:Sameer Zama Post published:January 6, 2021 In Q2 2020, research suggests that 2,578,501 phishing attacks were detected in the Gulf countries including UAE, Saudi Arabia, Qatar, Kuwait, Bahrain, Oman, and Egypt according to a recent Kaspersky… Continue ReadingEmail Security: Unawareness syndrome might cost you a fortune!
Email Security: Think Before You Click! Post author:Sameer Zama Post published:December 14, 2020 Giants like Microsoft are transcending the graph with 9,410 Unique Phishing URLs in Q2, impersonated at twice the rate of Facebook. It is to be noted that the number is… Continue ReadingEmail Security: Think Before You Click!
The Power of Identity and Access Management Post author:Sameer Zama Post published:November 22, 2020 The year 2020 has witnessed a plethora of “new normal”. Not only masks and social distancing, “Work from Anywhere” is the new normal. Until now, Work from Home and Bring… Continue ReadingThe Power of Identity and Access Management
DDoS Still Here, Still Effective and Still Making Money? Post author:Sameer Zama Post published:November 2, 2020 A DDoS (distributed denial-of-service) attack can be defined as a malicious attempt in which multiple compromised computer systems attack a target, such as a server, website or other network resource,… Continue ReadingDDoS Still Here, Still Effective and Still Making Money?
Identity & Access Management – Why Should Organizations Consider Investing in an IAM Program Post author:Sameer Zama Post published:November 2, 2020 Organizations these days are undergoing massive digital transformations, wherein traditional business operating models are being replaced or incorporated with digital technology and strategy. This digitization is applicable to all stakeholders… Continue ReadingIdentity & Access Management – Why Should Organizations Consider Investing in an IAM Program
Defeating Threats in Hand Post author:Sameer Zama Post published:October 20, 2019 In 2019, cyber-attacks are sophisticated and deceptive than ever. They move discretely and seamlessly between vectors, while targeting organizations of all sizes. Advanced security strategy is required for countering aggressive… Continue ReadingDefeating Threats in Hand
An Overview on Password Spraying Post author:Sameer Zama Post published:April 2, 2019 An Overview on Password Spraying Attacks and Defending Against Them Earlier this month, famous software giant Citrix had its internal network compromised and breached by a group of international cyber… Continue ReadingAn Overview on Password Spraying