Deltaspike

admin@delta

WHAT IS A SECURITY OPERATIONS CENTER (SOC)

Information security changes constantly and at a rate beyond comprehension. Hackers too are increasingly becoming relentless, making responding to information security incidents an ever more complex challenge.

TYPES OF CYBER ATTACKS

A Cyber-Attack is any kind of action that targets a Computer Information System and damages or steals the victims data. The data acquired is modified, damaged, sold or even held at ransom from the victim. The hacker does this through various types of Cyber-Attacks.

SKIMMING IS THE NEW HACK

Sri Lanka isn’t slow to the hacking game. Alongside the rest of the world, Sri Lankan ATMS and its customers are victims to what the Cyber Security world likes to call, ATM Skimming. Heard about it?

PORT SCANNING

Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.

VULNERABILITY ASSESSMENT

Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.

WHAT IS SQL INJECTION

SQL Injection (SQLi) is one of the most dangerous web-based vulnerabilities.

OWASP, a non-profit organization, dedicated to improving security of web applications, conducts a research and lists down the top 10 vulnerabilities each year.

Benefits of Honeypots

In my previous blog I discussed Port Scanning. In this blog I would like to discuss another method used to protect servers from attackers using Network Honeypots. A Honeypot is a sweet looking server, at least it’s intended to look sweet to the attacker, similar to how bears view honey. Honeypot is an additional security protection that can be used alongside a firewall this will help to protect your network from hackers.

Incident Management Process for an effective SOC

Organizations need to have a proper, focused, and a coordinated approach to responding to incidents. This includes a system for Occasion Response that outlines the correct way for implementing the Incident Response capability.

They’re only human after all…

IBM states that 60% of all cyber attacks are a direct result of insider attacks – caused by employees within an organization with malicious intent. While you might be right in assuming that this will not be the case in your company, with only a few people having access to your systems, your employees can still be responsible for potential cyber attacks, unwillingly and unknowingly.