AGILE RISK ASSESSMENT FRAMEWORK (ARAF)

Identifying and managing cyber risk, one of the most worrisome areas of Enterprise Risk Management (ERM), is critical for any organization’s sustainability. As a valuable contributor to achieving business objectives, many organizations leverage risk assessments, as part of ERM activities, to identify, analyze, and evaluate cyber risk. However, traditional risk assessments are lately perceived as […]

ADDRESSING OWASP IoT VULNERABILITIES WITH SURELOG SIEM

Internet of Things (IoT) continues to digitize ordinary physical objects more and more in our daily lives. Organization, who adopted “If you do not run, you will fall behind” mantra, are already seeking to gain more financial and operational benefits from connected machines and devices used in different industries known as the Industrial Internet of […]

NEVER ATTEMPT TO WIN BY FORCE WHAT CAN BE WON BY DECEPTION

Despite the protective and detective security controls in place, attackers continue to deceive organizations and steal sensitive data by infiltrating the networks, moving laterally, gaining elevated unauthorized privileges and dwelling inside the networks undetected for a long time.  Organizations simply cannot keep up with the ever-changing attack methods against ever-increasing attack surfaces introduced with the […]

HOW TO LEVERAGE NIST CYBERSECURITY FRAMEWORK TO PROTECT DIGITAL CROWN JEWEL ASSETS

Digital Crown Jewel Assets (DCJA) are digital assets (data, application, system etc.) that if compromised or lost would result in a high financial, operational, or reputational risk which might be beyond the organization’s risk appetite. Almost all organizations with digital footprint have digital crown jewel assets such as Identity Access Management Systems, mission critical applications, core […]