/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Security to GST Ecosystem

GST-Network (GSTN) is trying to provide hi-tech security and analytics center to give protect the data under the Goods and Services Tax (GST) for the cyber threats. GSTN will be appointing security companies by August to build up Security Management and Analytics Centre (SMAC). SMAC will implement data analytics to protect the GST system from cyber attacks and will provide a better and protected environment for GST ecosystem. Read more at:http://cio.economictimes.indiatimes.com/news/digital-security/paranoid-about-security-setting-up-analytics-centre-gstn-ceo/59092397

 

Rate this blog entry:
3874 Hits
0 Comments

Security to GST Ecosystem

GST-Network (GSTN) is trying to provide hi-tech security and analytics center to give protect the data under the Goods and Services Tax (GST) for the cyber threats. GSTN will be appointing security companies by August to build up Security Management and Analytics Centre (SMAC). SMAC will implement data analytics to protect the GST system from cyber attacks and will provide a better and protected environment for GST ecosystem. Read more at: http://cio.economictimes.indiatimes.com/news/digital-security/paranoid-about-security-setting-up-analytics-centre-gstn-ceo/59092397

 

Rate this blog entry:
3784 Hits
0 Comments

Raise an alarm for minimizing cyber threat

In today's world, cybercrime is one of the biggest business challenges. There are two major problems which may arise during the attack, firstly the company might fail to predict the potential cyber threats and secondly, what will be the possible solutions they can adopt during the attack. The situation might lead to worse conditions if a business community wants to stay reluctant during the attack. In a recent survey, it was found that companies are keeping quiet, even though half (49%) of attacks have resulted in the interruption of business operations. It was also revealed that while as much as nine in 10 (91%) of U.K. business leaders say that cyber security is clearly important, only 57% have a formal strategy in place to protect themselves and just one-fifth (20%) hold insurance against an attack. It can only be avoided by strong firewall, community supports, measures for intellectual data transfer, and incorporating cutting edge technology for good governance.

Read more at: http://www.forbes.com/sites/dinamedland/2016/03/02/u-k-study-reveals-serious-under-reporting-of-cyber-attacks-by-business/#65aa3c1b392e

 

Rate this blog entry:
3684 Hits
0 Comments

Big Data to Eradicate Cyberthreats

Many companies are discovering that big data can also be used for security by offering a broader view of risk and vulnerabilities. In today's complex network environments, Advanced Persistent Threats (APTs) and other cyber threats can be wiped out by leveraging intelligence from data providers. Six ways for using big data to wipe out cyber threats include DNS feed which can provide lists of newly registered domains, domains commonly used for spamming and newly created domains, which can be incorporated into black and white lists, C2 systems which provide black lists of IP addresses and domains, threat intelligence which may be used to help determine if an address is safe or not, network traffic logs help to log all of the networks traffic  or even just parts of it, honeypots can be effective in identifying malware targeting a particular network and finally data quality is important to call attention to the data feed itself. By utilizing big data organizations can create more robust threat and risk detection programs. Read more at

http://www.informationweek.in/informationweek/news-analysis/296971/tips-wipe-cyberthreats/page/2

Rate this blog entry:
4686 Hits
0 Comments
Sign up for our newsletter

Follow us