/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Security to GST Ecosystem

GST-Network (GSTN) is trying to provide hi-tech security and analytics center to give protect the data under the Goods and Services Tax (GST) for the cyber threats. GSTN will be appointing security companies by August to build up Security Management and Analytics Centre (SMAC). SMAC will implement data analytics to protect the GST system from cyber attacks and will provide a better and protected environment for GST ecosystem. Read more at:http://cio.economictimes.indiatimes.com/news/digital-security/paranoid-about-security-setting-up-analytics-centre-gstn-ceo/59092397

 

Rate this blog entry:
4017 Hits
0 Comments

Security to GST Ecosystem

GST-Network (GSTN) is trying to provide hi-tech security and analytics center to give protect the data under the Goods and Services Tax (GST) for the cyber threats. GSTN will be appointing security companies by August to build up Security Management and Analytics Centre (SMAC). SMAC will implement data analytics to protect the GST system from cyber attacks and will provide a better and protected environment for GST ecosystem. Read more at: http://cio.economictimes.indiatimes.com/news/digital-security/paranoid-about-security-setting-up-analytics-centre-gstn-ceo/59092397

 

Rate this blog entry:
3897 Hits
0 Comments

Big Data to Eradicate Cyberthreats

Many companies are discovering that big data can also be used for security by offering a broader view of risk and vulnerabilities. In today's complex network environments, Advanced Persistent Threats (APTs) and other cyber threats can be wiped out by leveraging intelligence from data providers. Six ways for using big data to wipe out cyber threats include DNS feed which can provide lists of newly registered domains, domains commonly used for spamming and newly created domains, which can be incorporated into black and white lists, C2 systems which provide black lists of IP addresses and domains, threat intelligence which may be used to help determine if an address is safe or not, network traffic logs help to log all of the networks traffic  or even just parts of it, honeypots can be effective in identifying malware targeting a particular network and finally data quality is important to call attention to the data feed itself. By utilizing big data organizations can create more robust threat and risk detection programs. Read more at

http://www.informationweek.in/informationweek/news-analysis/296971/tips-wipe-cyberthreats/page/2

Rate this blog entry:
4788 Hits
0 Comments
Sign up for our newsletter

Follow us