/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Monitoring Things of Your Internet

The IoT is the next huge thing that’s coming up in IT industry. It opens up a lot of new aspects for them but there still is the question of security. Therefore, some suggest that Free Network Monitoring Software must be used when dealing with IoT. Read more at: 

https://www.spiceworks.com/it-articles/network-monitoring-internet-of-things/

 

Rate this blog entry:
2726 Hits
0 Comments

Securing cloud computing

What is cloud computing?? It refers to a broad set of policies, technologies and controls deployed to protect data, application and associated infrastructure. Its sub-domain is computer security, network security and information security. Working on a cloud or not is a basic question asked to every employee. For instance, people working in hospitals are generally blamed for disclosing health records of their patients. Talking to a layman, it is a group in an organization connected through networks, but even if the hackers are good at hacking, the data will remain safe within the company boundaries. Therefore, cloud computing is very wonderful stuff to work upon, but only in a secured way. To know more please read the following article by Dennis Stevenson (author): http://it.toolbox.com/blogs/original-thinking/cloud-computing-must-be-securre-75892

Rate this blog entry:
2592 Hits
0 Comments

All About Network Security

Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, alteration of computer network and network resources available. It also requires the authorization to access data in a network that is controlled by administrators. Users' needs to choose or assigned an Id and password and other information that allow them to access information and programs within their authority. Network security covers public and private computer networks, which are utilized in everyday jobs, conducting transactions and connection among business and government agencies and individuals and are involved in organizations, enterprises, and other institution. The most common and simple way to protect a network resource is by assigning it a unique name and a corresponding password.  To read more, read an article by Brendan Ziolo (Head of large enterprise strategy, Nokia): http://networkcomputing.com/net-security/security-starts-network/1250114547

 

 

Rate this blog entry:
3851 Hits
0 Comments

What is Real Intelligence Threat Analysis?

There is a big gap between what attackers do and what preventions defenders do to prevent it. The general idea is to build bigger and better blacklists for all the threats known or calculated using better threat intelligence.  We always hunt for easy ways, trying to seek out automation of security infrastructure. But these won't' suffice. The reason is because all the defenses are static and accessible to all. All it takes a hacker is to write a script to bypass these security measures. So a possible solution might be RITA, which stands for Real Intelligence Threat Analysis. Its SANS's free new framework that will help in hunting attackers by extending the traditional signature analysis. Read more at: http://www.darkreading.com/vulnerabilities---threats/introducing-rita-for-real-intelligence-threat-analysis/a/d-id/1323244

Rate this blog entry:
4277 Hits
0 Comments
Sign up for our newsletter

Follow us