Our Blog
New Cognito Launches the First Managed Cybersecurity Services Operation Center in Angola
New Cognito officially launched its new Managed Cybersecurity Services Operation, and related facilities and offices, including an up-and-running Security Operations Center (SOC). A Security Operations Center (SOC) is an important Cybersecurity structure, employing people, processes and technology to continuously monitor and improve an organization’s Cybersecurity posture while preventing, detecting, analyzing and responding to Cybersecurity incidents. […]
What is UBA, UEBA and SIEM
This article seeks to define and explain some common acronyms involved in today’s cybersecurity landscape. What is UBA? UBA stands for User Behaviour Analytics and is a threat detection analysis technology. UBA uses Artificial Intelligence (AI) and data science to understand how users normally behave and then find anomalous activities, which deviate from their normal […]
Vulnerability Scan vs Penetration Test
Vulnerability Scan and Pentest are often confused as the same service, but the reality is that we often acquire one but need the other. Both are important in their respective areas, necessary in an Information Security risk analysis and essential to ensure standards such as ISO 27001, CIS, NIST and others. Vulnerability Scan – The […]
The Impact of Covid-19 on Access Control
COVID-19 is changing the paradigm of cybersecurity in organisations, especially in the remote access aspect, usually provided by virtual private networks (VPN). This technology became over the years stable, and therefore underestimated, without undergoing a proper assessment of its impact on organizational security. With the exponential increase in remote access due to remote work caused […]
Multi-Factor Authentication
Multi-Factor Authentication (MFA) is the process by which multiple technologies are used to authenticate a user’s identity. This means that more than one credential is required to log into systems, applications and/or other digital assets. It is a fundamental part of the Zero Trust security approach that an organisation can adopt, as incidents of stolen […]
- 1
- 2