Zeeshan Baz - FM Qureshi, DG ISPR hold joint press conference after meeting of special committee on Kashmir

Image
Zeeshan Baz  has collected the information that: Islamabad: Prime Minister Imran Khan’s special committee on Kashmir held its first meeting at the Foreign Office on Saturday. The seven-member committee was formed on the prime minister’s directives on August 6.  The  committee  headed by Foreign Minister Shah Mahmood Qureshi comprises  ISI chief Lieutenant General Faiz Hameed, ISPR DG Major General Asif Ghafoor, Law Minister Farogh Nasim, Special Adviser to the Prime Minister on Information Firdous Ashiq Awan, parliamentary committee on Kashmir chairperson Fakhar Imam and Attorney General of Pakistan Anwar Mansoor Khan. Zeeshan Baz Following the meeting, the Foreign Minister, ISPR DG  held a joint press conference. The minister said  a Kashmir Cell is being set up in  the Foreign Office and the government also plans to establish Kashmir Desk at Pakistan’s  embassies in world capitals.  He said Pakistan has made a huge a...

Gartner’s Top 11 Technologies for Information Security

Zeeshan Mir Baz has collected the information from this website:https://www.gartner.com/smarterwithgartner/gartners-top-10-technologies-for-information-security/ in this article
said that:
How information security teams provide the most effective business support and risk management.
Modern information security teams encounter challenges unique to the current business environment. While the main goal of the team is to support emerging digital business, they’re also dealing with an increasingly advanced threat environment. At the Gartner Security & Risk Management Summit, Neil MacDonald, vice president at Gartner, spoke about the latest technology trends for 2016 that allow information security teams to provide the most effective business support and risk management.
Securing Digital Business: Adapt. Transform. Scale
Gartner Security & Risk Summit 2018
  1. Cloud Access Security Brokers
    Software as a Service (SaaS) apps, increasingly pervasive in enterprises, provide new challenges to security teams with their limited visibility and control options. Cloud Access Security Brokers (CASB) allow chief information security officers (CISOs) an opportunity to apply enterprise security policies across multiple cloud services.
  2. Endpoint Detection and Response
    Endpoint detection and response (EDR) solutions allow CISOs to detect potential security breaches and react quickly. These tools record endpoint and network events, and the data is continuously searched using known indicators of compromise (IOC) and machine-learning techniques for early identification of breaches.
  3. Nonsignature Approaches for Endpoint Prevention
    Techniques such as memory protection and exploit prevention and machine learning-based systems, which uses mathematical models, augment ineffective signature-based approaches for malware prevention against advanced and targeted attacks.
  4. User and Entity Behavioral Analytics
    User and entity behavioral analytics (UEBA) provide user-centric analytics alongside information about networks, endpoints, and applications. The correlation of these analytics offers more effective, accurate threat detection.
  5. Microsegmentation and Flow Visibility
    Microsegmentation, a more granular segmentation, stops attackers already in the system from moving laterally (“east/west”) to other systems. Visualization tools allow security teams to understand flow patterns, set segmentation policies and monitor for deviations. For data in motion, some vendors provide optional encryption of the network traffic.
  6. Security Testing for DevOps
  7. As DevOps integrates security into the workflow (DevSecOps) emerging operating models offer an automated, transparent and compliant configuration of underlying security infrastructure based on policy reflecting the currently deployed state of the workloads.
  8. Intelligence-Driven Security Operations Center Orchestration Solutions
    Intelligence-driven security operations centers (ISOCs) are designed to deal with the new “detection and response” paradigm. This solution requires the evolution of traditional security operation center (SOCs) to offer an adaptive architecture and context-aware components.
  9. Remote Browser
    CISOs can address malicious malware delivered via email, URLs or websites by isolating the browsing function from the endpoint and corporate network. This is done by remotely presenting the browser session from an on-site or cloud-based “browser server.” The server sessions can be reset to a known good state, and this technique reduces the surface area for an attack, shifting the risk to server sessions.
  10. Deception
    Deception tools, as the name implies, use deceit or tricks to thwart attacks. The security team creates fake vulnerabilities, systems, shares and cookies to tempt attackers. Any real attack on these resources indicates to security teams an attack is occurring, as legitimate users won’t see or need access to the fake systems.
  11. Pervasive Trust Services
    Security models must evolve alongside the projected pervasiveness of the Internet of Things (IoT) and increasing dependency on operational technology. Trust services can manage the needs of billions of devices with limited processing capability. More importantly, trust services are designed to scale and can offer secure provisioning, data integrity, confidentiality, devices identity and authentication.


Comments

Popular posts from this blog

Zeeshan Baz - FM Qureshi, DG ISPR hold joint press conference after meeting of special committee on Kashmir

People also ask

Information Technology