It is not necessary that all IT vendors from whom one obtain goods or services néed to submit assurance of security i.e. Hardware, consumables. A simple confidentiality clause would suffice in the Contract/SLA. However, vendors who would be…"
"PAM/PIM solutions are for privileged users. I find iraje PIM solution is far superior. Their roadmap is very clear and techinally they are unbeatable. In technical comparision, they would outstand. Once deployed, the solution works seamlessly. The…"
"Also please note that, incase of any security incident which cannot be resolved easily, the expert advise need to come only from expert which is from SOC team only. Therefore expertise lay in SOC and thus Threat Hunting need to be part of SOC only."
"Dear Team,
Threat Hunting has to be done by SOC team only. This is not an one time activity, this is periodically required and also whenever there is any exploit which is published on various sources from which the threat leads are obtained. There…"
Comments
Hi Sanjivan,
A very warm welcome to CISOPlatform !