by Subin Shrestha | Jan 4, 2023 | Blog
A network rack is a type of physical enclosure to organize and store networking equipment in a centralized location. Network racks come in various sizes, typically measured in rack units or “U”, which refers to the vertical space the equipment occupies in...
by Subin Shrestha | Dec 21, 2022 | Blog
Network assessment is the process of evaluating the performance, security, and configuration of a computer network. It involves identifying and analyzing the hardware, software, and protocols used in the network. In addition it includes the examination of the...
by Subin Shrestha | Dec 20, 2022 | Blog
A Threat Intelligence & Defense Operation. In the context of cyber security, SOC (Security Operations Center) is a security organization. It responsible for monitoring and defending an organization’s information systems and networks against cyber threats. A...
by Subin Shrestha | Dec 19, 2022 | Blog
The OSI model (Open Systems Interconnection model) is a framework for understanding how communications protocols work. It divides the process of transmitting data across a network into seven different layers. Each of the layers performs a specific function. The OSI...
by Subin Shrestha | Dec 17, 2022 | Blog
Security Information and Event Management (SIEM) is a cybersecurity strategy that involves the collection, analysis, and reporting of security-related data from multiple sources. The goal of SIEM is to provide organizations with a comprehensive view of their security...