SIEM:Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.
How do SIEM works?
It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins.
SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.
By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management systemimproves investigative efficiency and reduces time wasted on false positives.
The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.
Main features of SIEM
Time to respond
SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.
If you want tomore about it, then justdrop an email to firstname.lastname@example.org or contact the undersigned.
On 20th August 2021, China’s Standing Committee of the National People’s Congress has passed the Standing Committee of the National People’s Congress. This is the china’s first comprehensive data protection law.
This law which is passed is on the other jurisdictions’ omnibus data protection regimes, including the EU General DataProtection Regulation (“GDPR”). GDPR which stands for General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area that addresses the transfer of personal data outside the EU and EEA.
This law protects country’s efforts to regulate cyberspace and is expected to add more compliance requirements for companies in the country. It states the handling of personal information that must have clear and reasonable purpose and shall be limited to the “minimum scope necessary to achieve the goals of handling” data.
This also lays out conditions for which companies can collect personal data, including obtaining an individual’s consent, as well as laying out guidelines for ensuring data protection when data is transferred outside the country.
We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS & Azure ongoing cloud services.
We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email to email@example.com or contact the undersigned .
Amid the global pandemic here comes a new series of tweets from the OS giants Microsoft, where they have warned with a “massive email campaign; that’s pushing of a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection.”
STRRAT whic is a java based remote access tool which steals browser credentials, logs keystrokes and takes remote control of infected systems—all typical behaviors of RATs, MSI researchers described in documentation posted on GitHub about the malware.
This is a malware that has a unique feature i.e. “its a ransomware encryption/decryption module” that changes file names in a way that would suggest encryption is the next step.
How does it cause a damage?
Attackers used compromised email accounts to send several different emails. Some of the messages use the subject line “Outgoing Payments.”
STRRAT has first emerged in the threat landscape in June 2020, observing the Windows malware (version 1.2) in phishing emails containing malicious Jar (or Java Archive) attachments.
As we go around the globe we see that we all are facing this pandemic situation even now when we are near to the mid of 2021 but we still are facing this crises caused by COVID19 . We at DocTooLss believe that all our readers and followers are staying at home & following the COVID SMS rule i.e.
So now coming to our topic of Robotic technology , I guess we would be aware about Star Trek movies , The Robocop series or during our childhood we must have seen technology based cartoons such as “The Jetson’s” which use to get aired on “Cartoon Network” or the stone age cartoon “The Flintstones” which was just a opposite of “The Jetson’s”.
Now in 2021 we have come across with many robotic technology based machines and could even purchase from our very own e-commerce website Amazon.com
There are robotic based vacuum cleaners, the automatic drones, Alexa, Siri the voice assistance are some of the examples in AI and Machine Leaning technology .
What are Robots?
Robots are the intersection of science, engineering and technology that produces machines.
Types of Robots
Uses of Robots
Differences between Cobots & Robots
Cobots are designed to work alongside human employees, whereas industrial robots work on their own. A cobot can assist human employees. Whereas, industrial robots are used to automate the manufacturing process independently without any intervention from humans.
As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine is out and its dosage has been started. So we hope we all get the vaccine and we start engaging in our day to day normal life activities as it was before the COVID19 days.
It seems that Mark Zuckerberg’s security norms still needs some more modifications as its recently acquired WhatsApp the king in messenger platform has been in news due to some data leakage reasons yet again.
In the recent notification issued by WhatsApp where they have mentioned the recent update on their application which has taken the world with a storm, as it show cast the vulnerabilities it lacks.
So here at DocTooLss we compare our three Messengers which are in news and compare with eachother:
WhatsApp has kept end-to-end encryption. Plus, E2E on WhatsApp is available on every single mode of communication that the app enables such as messages, video calls, voice calls, photos, and anything else you share is E2E encrypted on WhatsApp.
What does E2E means?
E2E meaning that you and the recipient are the only people who can read the messages you send to them. WhatsApp can’t decrypt the contents of your messages, calls, photos, etc, thus ensuring your security and privacy.
“WhatsApp uses the E2E protocol developed by Open Whisper Systems, which is the name behind Signal messenger. That’s a good thing, because the Signal protocol is open source, widely peer-reviewed, and is generally considered one of the best protocols for implementing end-to-end encryption in messaging platforms.”
What is the issue with WhatsApp?
Although WhatsApp uses E2E encryption but the company does not encrypt backups (cloud and local). Also, it does not encrypt the metadata which is used to carry communication between two endpoints. This is one of the major criticisms of WhatsApp’s security model. While metadata does not allow anyone to read your messages but it lets authorities to know whom and when you messaged someone, and what was the duration for it.
What is Metadata?
Metadata is “data that provides information about other data” such as author, date created, date modified, file size, video logs , call logs , and chat history etc.
Incase of Telegram which does offer some protections to its users but however, there are some multiple pain points in the way Telegram encrypts your messages and other information.
Such as Telegram supports E2E encryption, but it’s not enabled by default and enabling it is not a cake walk as the only way to use E2E encryption on Telegram is by its secret chats feature.
The regular chats happening on Telegram are not E2E encrypted but messages sent in a secret chats are E2E encrypted. This means that the messages are encrypted on your device and but they are decrypted on Telegram’s server.
Note: So all the powers remains with Telegram that has the encryption keys on the server-side and can, in theory, access your normal chats.
Signal uses the open-source Signal Protocol to implement end-to-end encryption. And just like WhatsApp, the E2E encryption covers all forms of communication on Signal.
Why to choose Signal over WhatsApp and Telegram?
Signal has an edge over the both as WhatsApp which encrypts all the messages and calls (and that’s enough for most users), but Signal goes one step further and encrypts the metadata too.
There are some incredible amazing privacy features with Signal that is going to make your messaging experience even more private and secure. Such as one can lock Signal with a passcode or biometrics. There is 2FA (Two-factor Authentication) and an option to block screenshots within the app and the recent screen.
IMPORTANT: Not even that recently Signal has added a new feature to blur faces automatically before sending images. which is one of the USPs for Signal Messenger application.
Wait we are not done, Signal by default encrypts all the local files with a 4-digit passphrase. And if you want to create an encrypted local backup then you can do that as well. The app now also supports encrypted group calls .
So if you have read our complete blog, you are able to understand that how Signal is cut above WhatsApp and Telegram.
Although WhatsApp is loaded with lot many features and to us messaging means WhatsApp and its a part of our lifeline today even from Generation Z to Baby Boomers all are on WhatsApp. So it will take lot of time to move out of WhatsApp to Signal and till that time WhatsApp would have rectified its issues and load up with many more goodies so lets hope for the best and leave the rest .
As we know that there are many services which are offered by AWS , lets pick few and try to understand their usage and utility it has for us:
AWS EC 2 (Virtual Servers on Cloud)
EC2 stands for Elastic Compute Cloud
It is one of the most famous offerings by AWS
It is a IaaS platform
It is basically renting of VMs
Storing data on Virtual Drives (EBS , ELB) and Distributing load across machines
Scaling of service using an auto-scaling group (ASG)
There are wide variety of Amazon EC2 Instance types comprise varying combinations of CPU, memory, storage, and networking capacity that gives you the flexibility to choose the appropriate mix of resources for your applications.
Each instance type includes one or more instance sizes, allow you to scale your resources either up or down and in or out to the requirements of your target workload.
EC2 Image Builder is a fully managed AWS service that makes it easier to automate the creation, management, and deployment of customized, secure, and up-to-date “golden” server images that are pre-installed and pre-configured with software and settings to meet specific IT standards.
The guided steps by EC2 Image Builder:
Provide starting artifacts
Add and remove software
Customize settings and scripts
Run selected tests
Distribute images to AWS Regions
Features of EC2 Image Builder
Increase productivity and reduce operations for building compliant and up-to-date images
In the world today where we are breathing through masks, due to the pandemic times, where mostly all are working from home. Businesses need to be automated. In a real business scenario where we would have some technical glitches or a bearing failure whereby the service technician would file a complaint, either by creating or raising a ticket physically over a tablet or laptop, but with IoT it will sensorise the oil well with more fine crane monitoring the data and analytics and read a conclusion as there will be a bearing failure in future. The automation will create a fixed ticket automatically, detecting through IoT and remediate it through choreographically.
As per Gartner by 2024, 50 % of the enterprise’s applications in production will be IoT- enabled. Many applications will be connected to IoT as companies have connected IoT to their backhand systems.
The benefits of IoT and the widespread of IoT:
IoT enables your business applications to improve how you perform your business.
By 2023, 35% of midsize to large enterprises will leverage a hybrid cloud-to-edge computing deployment model for at least one IoT project.
By 2023, 25% of on-site industrial assets will be connected by closed-loop systems using IoT technologies.