Featured Posts

February 26, 2018

Introduction

Today, significant amount of IT expenditure goes into detection including firewalls, anti-virus, SIEM, IDS/IPS (Intrusion detection/Prevention) systems. Yet, we have seen threats getting through these perimeter defenses without getting detected. There are s...

February 18, 2018

Introduction

The growth of Internet and emergence and explosion of new devices has led to increase in both data volume and security risks for the enterprise. Now, more devices are being connected and Internet ready, new avenues of attack, and potentially sabotage open u...

February 4, 2018

Many enterprises have begun to realize the potential and benefits of big data. Understanding a high level view of the reference architecture provides a good background in how Big Data complements existing analytics, storage systems, databases and other IT systems. The...

Please reload

I'm busy working on my blog posts. Watch this space!

Please reload

Recent Posts

February 26, 2018

Please reload

Archive
Please reload

Search By Tags

I'm busy working on my blog posts. Watch this space!

Please reload

Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
  • Facebook App Icon
  • Twitter App Icon
  • Google+ App Icon