In the ever-evolving landscape of cloud computing, the concepts of dynamic resource allocation and elasticity play pivotal roles in ensuring optimal performance, scalability, and cost-efficiency. In this blog post, we delve into these concepts, explor…
Introduction Security Operations Centers (SOC) need to how the current key skills , tools and processes to be able to detect, investigate and sop threats before they become costly data breaches. Definition A set of defined repeatable steps that take …
It was introduced in 2004 by American Express,Discover,MasterCard, and Visa in response to security breaches and financial losses within the credit card industry. Since 2006 the standard has been financial losses maintained by the PCI standards counci…
HIPAA - HITECH The US Federal laws and regulations that defines the control of most personal healthcare information for companies responsible for managing data. The HIPAA Privacy rule establishes standards to protect individuals medical records and ot…
Why SOC Reports? Some industry require SOC2 or local compliance audit. Many organizations who know compliance, know SOC2 Type 2 consider it a stronger statement of operational effectiveness than ISO 27001 (Continuous Testing). Many organization's…
Computer Fraud and Abuse Act (CFAA) The computer Fraud and Abuse Act is a US cyber security bill that was enacted in 1984. Federal Information Security Management Act of 2002 ( FISMA ) Federal Information Security Modernization Act of 2014 ( FISMA 201…
Security Event An event on a system or network detected by a security device or application. Security Attack A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect,disrupt,deny,…