Search Result for CTI


Search result for "CTI"

About 163 Results Found in 0.00017809867858887 Sec



What is spear phishing - articles

Spear phishing is a type of social engineering attack that targets specific individuals or organizations with the goal of stealing sensitive information such as login credentials, financial information, or confidential documents.

1080 Views

Travel Smart: A Guide to Cybersecurity While Travelling - blog

As technology advances, the importance of cybersecurity while traveling cannot be overstated. While traveling, you carry a lot of sensitive information on your mobile devices such as credit card information, passwords, and personal data.

1080 Views

Cert-in Guidelines for Cloud Security: Best Practices for Securing Cloud Infrastructure - blog

As organizations increasingly adopt cloud computing, ensuring robust security measures becomes paramount to protect sensitive data and mitigate cyber risks. The Indian Computer Emergency Response Team (CERT-In) has established comprehensive guideline

1073 Views

The rise of social engineering attacks and how to avoid falling victim to them - blog

Social engineering is a form of cyberattack that uses deception and manipulation to gain access to sensitive information or systems. It can take many forms, including phishing emails, phone scams, and even physical impersonation.

1070 Views

Understanding Risk Assessment: Safeguarding Your Digital Assets - articles

In today\'s dynamic and interconnected world, organizations face an ever-evolving landscape of cyber threats. It has become imperative for businesses to adopt a proactive approach to security by identifying and mitigating potential risks.

1068 Views

What is Extended Detection and Response (XDR)? - articles

XDR is a comprehensive cybersecurity solution that integrates multiple security technologies to provide a complete view of an organization\'s cybersecurity posture.

1051 Views

Active Directory and its Benefits - blog

Active Directory (AD) is a directory service created by Microsoft, used to manage network resources and provide a centralized authentication and authorization mechanism for Windows-based operating systems

1045 Views

How Does a Secure Web Gateway Work? - articles

A Secure Web Gateway, often abbreviated as SWG, is a cybersecurity solution designed to protect users and organizations from web-based threats and ensure a safe and secure web browsing experience.

1042 Views

What is Network Access Control? - articles

Network Access Control (NAC) refers to a set of technologies, policies, and practices that allow organizations to enforce security policies and regulate access to their network infrastructure.

1026 Views

What is a Web Application Firewall (WAF)? - articles

A WAF is a security solution that provides protection for web applications against various types of cyber-attacks. It acts as a barrier between your web applications and the Internet, analyzing incoming traffic and blocking malicious requests. 

1021 Views
First 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Last



 

Get in touch

For Complete Cyber Security & Cloud Services Solution
+91 22 49792922 | sales@cybernx.com


Subscribe to our Newsletter!


CyberNX
Typically replies within 10 minutes

CyberNX
Hi there 👋

How can I help you?
03:04
×
Enquire Now!