MKKPRO

All posts by MKK

  • 06/08/2023 0 Comments

    Ransomware is defeatable Ransomware can be defeated; however, we must have a comprehensive strategy. The two most significant security risks we face today are Cy-X attacks (Ransomware) and double...

  • Confused selecting a right detection & response solution? It takes patience, expertise, money, and effort to detect and respond to a problem. Take a look at this article to...

  • How do we choose which EDR tool to use? Endpoint attacks are getting more common and smarter, and the number of people working remotely has gone up recently. This...

  • Azure Cloud Foundation Acceptance Criteria Acceptance criteria are generally a list of prerequisites that must be met for a project or program to be deemed complete. Because they specify...

  • Cloud Foundation – Landing Zone design Cloud computing is becoming an increasingly strong enabler of efficiency, agility, and quick innovation as a result of the expanding breadth and depth...

  • 23/03/2023 0 Comments

    Everywhere I go for security consultations, this is the most frequently asked question, therefore I decided to write an article on this subject.

  • 12/03/2023 0 Comments

    What is the significance of CNAPP? Before get into CNAPP, lets understand what exactly is cloud-native cyber security? The term “cloud-native cyber security” refers to a collection of different...

  • 11/02/2023 0 Comments

    Best Practices for Cloud Security This cloud security article outlines the problems that companies face today, as well as best practises for securing and managing cloud-native products and tools,...

  • 30/01/2023 0 Comments

    Understanding Gartner’s AI TRiSM As more people recognize its power, AI is advancing fast. Technology creates professions, use cases, and enterprises. Gartner Inc., a respected technology research and consulting...

You cannot copy content of this page