SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Monitoring Things of Your Internet

The IoT is the next huge thing that’s coming up in IT industry. It opens up a lot of new aspects for them but there still is the question of security. Therefore, some suggest that Free Network Monitoring Software must be used when dealing with IoT. Read more at: 

https://www.spiceworks.com/it-articles/network-monitoring-internet-of-things/

 

  3104 Hits

Securing cloud computing

What is cloud computing?? It refers to a broad set of policies, technologies and controls deployed to protect data, application and associated infrastructure. Its sub-domain is computer security, network security and information security. Working on a cloud or not is a basic question asked to every employee. For instance, people working in hospitals are generally blamed for disclosing health records of their patients. Talking to a layman, it is a group in an organization connected through networks, but even if the hackers are good at hacking, the data will remain safe within the company boundaries. Therefore, cloud computing is very wonderful stuff to work upon, but only in a secured way. To know more please read the following article by Dennis Stevenson (author): http://it.toolbox.com/blogs/original-thinking/cloud-computing-must-be-securre-75892

  2988 Hits

What is Real Intelligence Threat Analysis?

There is a big gap between what attackers do and what preventions defenders do to prevent it. The general idea is to build bigger and better blacklists for all the threats known or calculated using better threat intelligence.  We always hunt for easy ways, trying to seek out automation of security infrastructure. But these won't' suffice. The reason is because all the defenses are static and accessible to all. All it takes a hacker is to write a script to bypass these security measures. So a possible solution might be RITA, which stands for Real Intelligence Threat Analysis. Its SANS's free new framework that will help in hunting attackers by extending the traditional signature analysis. Read more at: http://www.darkreading.com/vulnerabilities---threats/introducing-rita-for-real-intelligence-threat-analysis/a/d-id/1323244

  4839 Hits
Sign up for our newsletter

Follow us