Uncategorized

Patch management tricks and techniques

I. What is a patch? In technical terms, “Patch” are the changes performed on a computer program/software to enhance its security shield against newly rising cyber-attacks. In simple terms, we can also refer to them as software updates that includes fixing vulnerabilities, performance bugs, or error discovered after product release. Along with all these fixations,…

Cloud Security

Top Threats In Cloud Security

“Top Threats to Cloud Computing”, provides needed background to help organizations in making refined risk management decisions regarding their cloud adoption strategies. #Threat1- Misuse of cloud computing: PaaS providers have usually suffered most from this type of attacks. Recent evidence shows that attackers have initiated to target IaaS cloud providers as well. Forthcoming areas of…

Cloud Security

Cloud Fundamentals and Cyber Security Assessment -3

Security threats 1. Misuse of Cloud Computational Resources: In order to conduct cyber-attacks on computer systems, a large amount of computing power is required. So, hackers use multiple computers to develop higher computing power. This is a complicated case which may take few months to complete. But nowadays, this can be done easily. Using a…

Cloud Security

Cloud Fundamentals and Cyber Security Assessment -1

Cloud Fundamentals and Cyber Security Assessment Cloud Computing Cloud computing refers to a model in which computing resources and applications are accessed on demand, from anywhere in the world. Cloud computing provides a shared pool of resources such as data storage space, computer processing power, networks, corporate and user applications etc. In short is the…