The Cyber Lens
115 Posts 1

With a background in interacting with Security Systems and Cyber Platforms, I will use this blog to offer views on industries and their use of different & trending technologies ~ The Third Verse.

Latest Posts

Relevance
Cyber Response Triage Process 4573

Its Christmas time. The Elves want to process your gift list for Santa to deliver. They are almost prepared and ready to deliver. Similarly, you’ve already signed off for the holiday season or just about finishing getting projects and activities in order.  Your organisation is likely staggering change activities over the festive season so you ...

Added by Rimesh Patel
Blog The Cyber Lens
11/12/2016
Globalising Tier 2 Roles ; Or Not. 4484

Most modern day cyber roles are globalised. However, if you function in a Tier 2 division and try to globalise its processes then you are likely to fail. Similarly, localising those Tier 2 cyber roles will also introduce a ceiling. Instead, it is recommended to ‘enterprise’ the processes of a Tier 2 function. This introduces accountability, ...

Added by Rimesh Patel
Blog The Cyber Lens
16/11/2016
The Cyber Peak; Expectations Of Market Size And Projections. 4349

I recently researched the potential growth of the Cyber Security market;   1.The Europe Cyber Security Market is expected to grow to $35.53 billion by 2019 and will contribute to 27 % of the global market by 2019. 2.The Middle East and Africa Cyber Security Market is expected to grow to $13.43 billion by 2019 and will contribute 7.19% of the global market ...

Added by Rimesh Patel
Blog The Cyber Lens
16/10/2016
Personification; Collect Data, Listen & Respond. 4304

Sonification. When a fire test occurs in a building - the alarms are loud, people respond without chaos, wardens know what vested jackets to wear and where to stand to group the work force as they exit the building. Similarly, If a system existed that could perform sonification on the activities of a SOC using big data techniques ( SAS or Hadoop ), then it ...

Added by Rimesh Patel
Blog The Cyber Lens
08/10/2016
Responding To The Kill Chain; Kill The Chain. 4255

1.Expensive and Laborious – A common two word association before security/cyber audits. 2.Cyber Ready – A common two word association after a compromise.  It is likely reading Cyber Ready evoked a sense of confidence, stability and a calm alertness (just like the hit you’re meant to get after drinking matcha green tea  ... apparently). To be Cyber ...

Added by Rimesh Patel
Blog The Cyber Lens
30/09/2016
Developing The X-Factor 4030

The perimeter platforms of the 90's that secured and kept stable most TCP/IP networks might now provide clarity on how networks designed at TCP/IP layer 2 and 3 can help with securing cloud infrastructures i.e. modern networks. Cloud based platforms offer high level of functionality at layer 7, though through standardisation, there are some ...

Added by Rimesh Patel
Blog The Cyber Lens
10/08/2016