dblSec

IT Security

Menu
  • Home

What is ISO 27001

22/08/2022
 |  No Comments
 |  Uncategorized

First, it is important to note that the full name of ISO 27001 is β€œISO/IEC 27001 – Information technology […]

Read More →

What is SIEM? And How Does it Work?

07/03/2022
 |  No Comments
 |  Uncategorized

What is SIEM? SIEM stands for security, information, and event management. SIEM technology aggregates log data, security alerts, and events into […]

Read More →

What is Privileged Account Management (PAM)?

16/10/2021
 |  No Comments
 |  Uncategorized

Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone […]

Read More →

Cybersecurity Risk Assessment

10/10/2021
 |  No Comments
 |  Uncategorized

Why carry out a cybersecurity risk assessment? Risk assessment – the process of identifying, analyzing, and evaluating risk – […]

Read More →

CISSP Exam: What are the prerequisites?

01/09/2020
 |  No Comments
 |  Uncategorized

Introduction For every information security professional, one of the aims should be to constantly upgrade the knowledge that they […]

Read More →

Network Printer Security Best Practices

22/04/2019
 |  No Comments
 |  Uncategorized

Multifunction printers (MFPs) are experiencing an identity crisis:  IT administrators don’t always see them as the full-fledged networked computers […]

Read More →

6 Struggles with ERP Security: What to Be Aware Of

 |  No Comments
 |  Uncategorized

1. Lack of security knowledge Often when it comes to security, most people think of some hackers penetrating the […]

Read More →

What is each server for: Dev, Test, UAT, Staging, Demo and Production

09/04/2019
 |  No Comments
 |  Uncategorized

In the world of software development, there are processes followed that belong to the software development lifecycle (SDLC). Each […]

Read More →

Drones are Quickly Becoming a Cybersecurity Nightmare

26/03/2019
 |  No Comments
 |  Uncategorized

Hacked drones are breaching physical and cyberdefenses to cause disruption and steal data, experts warn. Drones are a growing […]

Read More →
    admin1 Avatar

    Recent Posts

    • What is ISO 27001
    • What is SIEM? And How Does it Work?
    • What is Privileged Account Management (PAM)?
    • Cybersecurity Risk Assessment
    • CISSP Exam: What are the prerequisites?

    What is Cyber Security?

    https://www.youtube.com/watch?v=ooJSgsB5fIE
    Provided by OpenSpeedtest.com

    SKT IT Solutions