Day: September 15, 2021

shape
shape
shape
shape
shape
shape
shape
shape
Standard

Performing Cyber-security Risk Assessment

Risk assessments are used to identify, estimate, and prioritize risk to organizational operations, organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems. -NIST (National Institute of Standards and Technology)  WHAT DO WE MEAN BY CYBER-RISK?   A cyber-risk is a way for criminals to attack sensitive data, finances,

Standard

The steps to migrate MySQL database to Google Cloud SQL are:

MySQL is a database management system. A database is a collection of data. It can be anything from a simple grocery list to a picture gallery or the vast amounts of information in a corporate network. Its development process focuses on offering a very efficient implementation of the features most people need. This means that MySQL

Standard

Anomaly Detection

The process to find abnormal and unusual values in a dataset is referred to as anomaly detection. It’s usually an unsupervised machine learning technique as rarely do we have labels for the observation, so most of the time, algorithms (algos for detecting anomalies) rely purely on features of the observations. There are two terms outlier detection and novelty

Standard

Security Factors When Considering Cloud Adoption

Some of the security factors to be considered for cloud adoption includes  Protection of intellectual property:  A McAfee analysis found that 21% of the files uploaded to file-sharing services contained sensitive data related to intellectual property. There is a considerable risk associated with BYOC in which the organizations don’t know what information and intellectual properties

Connect With Us

Request a Consultation