In an era where cyber threats have become increasingly pervasive and sophisticated, the need for a robust understanding of cybersecurity has never been more critical. At GBB, we believe that sharing knowledge and experience is key to building a safer digital world. In this blog, we’ll be sharing our real-world experiences and learnings from the […]
January 3, 2024Imagine launching a safe attack on your own security infrastructure, uncovering gaps and vulnerabilities before others do. Challenge yourself first. Dive deep to spot misconfigurations, insecure policies, and potential weak points. No!!!! This isn’t a concept of the distant future; it’s very much alive & kicking in the form of Breach & Attack Simulation (BAS)….. […]
October 9, 2023STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated Exchange of Indicator Information) are technologies developed to improve the detection, analysis, and sharing of cyber threat intelligence. STIX: is a language used for standardizing the representation of information about cyber threats. It allows different organizations and individuals to represent complex information in a consistent, structured […]
September 25, 2023When it comes to safeguarding your organization’s network, firewalls or a next-generation firewall (NGFW) play a crucial role as the first line of defense against cyber threats. However, sizing a firewall solely based on the number of users is a common mistake that can lead to inadequate protection and potential security vulnerabilities.. Understanding the Limitations […]
August 9, 2023Customers usually choose to go for two firewalls in high availability (HA) mode for several reasons, including: Redundancy: The primary reason for configuring two firewalls in high availability mode is to ensure redundancy. If one firewall fails, the other firewall takes over seamlessly, ensuring continuous protection for the network. Business continuity: High-availability firewalls are essential for […]
February 21, 2023Before understanding the countermeasures, let’s understand the sequence of events pertaining to the Cyber Attacks on All India Institute of Medical Sciences (AIIMS), a premier public medical research institution and a hospital based in New Delhi. The cyber-attack on AIIMS was reported on 23rd November 2022, this lasted for more than 15 days & only by 6th […]
February 21, 2023Vulnerability Assessment and Penetration Testing (VAPT) is a process of identifying, evaluating, and prioritizing the vulnerabilities in a computer system, network, or web application. Vulnerability assessment is performed to discover and analyze potential security weaknesses in a system, while penetration testing involves simulating an attack on the system to evaluate the security measures in place […]
February 6, 2023A Network Management System (NMS):- is a software application or set of tools used to manage and monitor the performance, availability, and overall health of a computer network. These tools work by collecting, processing, and analyzing network data in real time. The general steps involved in the process are as follows: Data collection: The first […]
February 6, 2023What is backup Automation? Backup automation is the process of automatically creating and managing backups of data. This includes scheduling backups to run at specific intervals, as well as automating tasks such as verifying the integrity of backups, and performing data restoration. Backup automation is typically accomplished using software tools, which can be scheduled to […]
February 6, 2023HCI Vs Traditional Infrastructure Hyper-converged infrastructure (HCI) is a type of data center architecture that combines the three main components of a data center – compute, storage, and networking – into a single, integrated system. This allows for a more streamlined and simplified data center management, as all the resources are managed and configured from […]
January 23, 2023Want to know how our solutions can help your business?