What is Python? It is essentially an object oriented, high level programming language with dynamic semantics primarily used for website and application development. It possess high level built in data structures, dynamic typing and dynamic binding, making it very attractive for Rapid Application Development. Benefits of using...

Vulnerability management is more than just running tests and identifying gaps. Rather it is a process to detect weaknesses and proactively fix them before they are exploited. Vulnerability management lifecycle includes planning and prioritizing to mitigate potential risks and threats. In this blog we discuss...

Security breaches are happening at an alarming rate making increased cybersecurity a priority for organizations big and small. Data security is no longer only an IT issue and requires business leaders to implement new robust security technologies in order to build a resilient IT infrastructure.  With...

Leading organizations understand the value of data in decision making and use it to their advantage by gathering, auditing and manipulating intelligence hidden in data. However, the challenge most businesses face is maneuvering around colossal amounts of machine-generated data that can be structured, unstructured or...

The internet is a great resource that is invaluable in our everyday lives. However, it brings with it a myriad of privacy and security issues. More so in today’s times when our digital footprints are everywhere, privacy is a huge concern for most of us....

Then and now The 80s were a period of economic boom and a rise in technology. Cyber crimes were trivial and not financially driven. A small-time hacker disrupting your personal computer was more for the thrill than for financial gain. Malware was used to erase contents...

What is Penetration Testing? Penetration testing is a practice to test IT networks, software, systems, devices, and applications in order to uncover security gaps and vulnerabilities that could be exploited. Penetration testing is also referred to as Pen testing or ethical hacking and enables you to...

In our previous blog titled How data ages in Splunk, we discussed the different stages that data goes through. We explained how data progresses from Hot to Warm to Cold to Frozen and Thawed stages. Data in the frozen stage can either be archived or...

As cybercrimes grow in numbers and sophistication, it has become essential for businesses to take a proactive approach to ensure security against cyber threats. Agile businesses are investing heavily in cybersecurity strategies to eliminate risks and keep sensitive data secure. No business is immune to...

Cyberattacks are a rising crime not only in the U.S. but all over the world. Cybercrimes have become the most significant and expensive threat to companies of all sizes as they become progressively more sophisticated and organized. Recent high-profile attacks include data breach at Marriott in 2018, the...