Anasayfa » Arşiv Ozkaya

Yazar: Ozkaya

Incident Response and Management

A successful approach to incident response and management ensures that an organization is set up for success to protect their organizations information. This is achieved by developing and implementing an incident response plan. With that in place, organizations are able to protect, detect, and respond as fast as possible to a service disruption. The employees that are part of the Security Operatio...

Strategic tactics are key to a robust Cloud Security Posture Management regime

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical systems, and people are protected. An effective cyber strategy is normally on par with the cybersecurity risk exposure of an entity. It covers all possible attack landscapes that can be targeted by m...

Creating a Vulnerability Management Strategy

Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent a vulnerability from being exploited if you don’t know whether your system is vulnerable? The answer is to have a vulnerability management process in place th...

How To Get The Most Out Of Your Security Investment

In today’s digital age, ensuring your organisation’s sensitive data remains secure within company walls goes far beyond simply buying and implementing a security solution. With the elevated threat of increasingly sophisticated cyberattacks, it is absolutely necessary that companies understand which security solution best fits their IT environment and what steps need to be taken in order to ensure ...

Introduction to Cybersecurity and Dark Web (Part 2)

Web and Its Levels The term dark web is part of the WWW and known as invisible/hidden web. The content on the dark web remains hidden and cannot be searched through conventional search engines. The content only exists on personal encrypted networks or peer-to-peer configurations, and it is not indexed by typical search engines. Therefore, the large part of the internet that is inaccessible to conv...

Introduction to Cybersecurity and Dark Web (Part 1)

Cybersecurity and Cybercrime Introduction to Cybersecurity and Dark Web Cybersecurity and Cybercrime The expansion of internet has created a great opportunity among the users in different domains, for instance, academic, government, business, and industry sectors. However, this growing development has also created the opportunity to exploit vulnerabilities to attack the infrastructure and system, ...