Warren

Virtual Security Officer - Cyber Security Advisors | SecuriCentrix

Understand And Improve Your Incident Response Maturity Level

A proper understanding of the incident response maturity level is important for an organisation’s cybersecurity. Incident Response management is a process that keeps growing continuously. Reaching a maturity level takes time, effort, knowledge transfer, training, and experience. As attackers apply innovative tools to attack, it becomes more important than ever to plan for the ever-evolving …

Understand And Improve Your Incident Response Maturity Level Read More »

Managed SIEM - Cyber Security Advisors | SecuriCentrix

What is managed SIEM?

What is SIEM? SIEM refers to Security Information and Event Management. SIEM software aids cybersecurity experts in protecting their IT infrastructure from a variety of cyber attacks. The SIEM system gathers log data from the whole infrastructure of a business, which includes routers, switches, firewalls, servers, personal computers and devices, apps, cloud environments, and other …

What is managed SIEM? Read More »

Managed EDR - Cyber Security Advisors | SecuriCentrix

Why Deploy an EDR?

What is an Endpoint? Is your device connected to the internet? Do you use a closed network in your office? Then your device is an endpoint. Any device that is physically at the end of a network can be called an endpoint. They can be laptops, desktops, mobile phones, tablets, servers, and even IoT devices.  …

Why Deploy an EDR? Read More »

PCI PIN - Cyber Security Advisors | SecuriCentrix

Payment Security

Introduction While the notion of paying and being paid has remained consistent over time, contemporary payments have significantly reimagined how consumers make payments and how businesses earn, transfer, store, and process consumer payment data. Payment technologies have improved, making payments more unsophisticated and effortless; nonetheless, payment data breaches have evolved, and businesses now have to …

Payment Security Read More »

Managed SOC - Cyber Security Advisors | SecuriCentrix

Ransomware Attack and Protection

What is Ransomware? Ransomware is malicious encrypting software used by cybercriminals to target governments, healthcare providers, educational institutions, and other organisations worldwide. According to a survey, A company is expected to be hit by ransomware every 11 seconds by the end of 2021, causing up to $20 billion in damages. Ransomware is developed to encrypt …

Ransomware Attack and Protection Read More »

Cyber Security Advisors | SecuriCentrix

Mitre ATT&CK

What Is Mitre ATT&CK? MITRE Adversarial Tactics, Techniques, and Common Knowledge a.k.a MITRE ATT&CK® is a framework created by MITRE in 2013 to document attacker tactics and techniques based on real-world observations.  Built based on the Cyber Kill Chain, developed by Lockheed Martin in 2011, MITRE ATT&CK rather than describing a single attack focuses on …

Mitre ATT&CK Read More »

Cloud Security - Cyber Security Advisors | SecuriCentrix

Cloud Vs Legacy

Can Cloud Be The Answer To Legacy IT Problems? The report is based on an analysis of more than 18,000 Common Vulnerabilities and Exposures (CVEs) logged to NIST’s National Vulnerability Database in 2020. It reveals that well over half (57%) were rated ‘high’ or ‘critical’ severity – the highest recorded figure for any year to …

Cloud Vs Legacy Read More »

Scroll to Top