SECURITY BLOG
Welcome to Cyber Electra on cybersecurity blog!
HOW TO LEVERAGE NIST CYBERSECURITY FRAMEWORK TO PROTECT DIGITAL CROWN JEWEL ASSETS
Digital Crown Jewel Assets (DCJA) are digital assets (data, application, system etc.) that if compromised or lost would result in a high financial, operational, or reputational risk which might be beyond the organization’s risk appetite.
NEVER ATTEMPT TO WIN BY FORCE WHAT CAN BE WON BY DECEPTION
Despite the protective and detective security controls in place, attackers continue to deceive organizations and steal sensitive data by infiltrating the networks, moving laterally, gaining elevated unauthorized privileges and dwelling inside the networks undetected
ADDRESSING OWASP IoT VULNERABILITIES WITH SURELOG SIEM
Internet of Things (IoT) continues to digitize ordinary physical objects more and more in our daily lives. Organization, who adopted “If you do not run, you will fall behind” mantra, are already seeking to
AGILE RISK ASSESSMENT FRAMEWORK (ARAF)
Identifying and managing cyber risk, one of the most worrisome areas of Enterprise Risk Management (ERM), is critical for any organization’s sustainability. As a valuable contributor to achieving business objectives, many organizations leverage risk