CLOUDLOGIC KE

57 posts

CLOUDLOGIC KE

CLOUDLOGIC KE

@cloudlogic_ke

Cybersecurity | Network Security | Email Security | Endpoint Security | WAF | PAM | DLP | Risk and Compliance | Pentesting | Threat | IAM

Showbe Plaza , Murang'a RD Sumali Mart 2023
25 Sinusundan7 Mga Tagasunod
CLOUDLOGIC KE
CLOUDLOGIC KE@cloudlogic_keยท
Information Architecture: Deals with the structure of an organization's logical and physical data assets and data management resources. Its scope covers how data is collected, stored, transformed, distributed, and consumed. It also deals with data governance and policy.
English
0
0
1
15
CLOUDLOGIC KE
CLOUDLOGIC KE@cloudlogic_keยท
Application Architecture: Focuses on specific applications used, their design, their interaction with each other, users and other applications. Technology Architecture: Documents the hardware, software and network infrastructure used in the business and how they are deployed.
English
1
0
0
22
CLOUDLOGIC KE
CLOUDLOGIC KE@cloudlogic_keยท
What is Enterprise Architecture (EA)? EA identifies IT systems, applications, and processes and how the parts fit together It includes standardizing processes and reorganizing IT infrastructure to align with business goals
English
1
0
1
16
CLOUDLOGIC KE nag-retweet
The Hacker News
The Hacker News@TheHackersNewsยท
๐Ÿšจ Backups are failing when it matters most. ๐Ÿ”น Only 40% of IT teams trust their backups ๐Ÿ”น Downtime costs $14K/min ๐Ÿ”น 60% think they can recover in a dayโ€”only 35% do ๐Ÿ”น 94% of ransomware victims have backups targeted IT leaders must act now. See the State of Backup & Recovery 2025 for key risks & solutions. Read now: thehackernews.com/2025/03/bcdr-2โ€ฆ
The Hacker News tweet media
English
4
12
52
80.7K
CLOUDLOGIC KE
CLOUDLOGIC KE@cloudlogic_keยท
These guidelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.
English
0
0
0
13
CLOUDLOGIC KE
CLOUDLOGIC KE@cloudlogic_keยท
Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.
English
1
0
0
14
CLOUDLOGIC KE
CLOUDLOGIC KE@cloudlogic_keยท
๐—œ๐—ป๐—ฐ๐—ถ๐—ฑ๐—ฒ๐—ป๐˜ ๐—ฅ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐˜€๐—ฒ ๐— ๐—ฒ๐˜๐—ต๐—ผ๐—ฑ๐—ผ๐—น๐—ผ๐—ด๐—ถ๐—ฒ๐˜€ ๐—ฆ๐—ข๐—ฃ๐˜€ (๐—ฆ๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐—ฑ๐˜‚๐—ฟ๐—ฒ๐˜€)/๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€ A playbook, also known as a SOPs, consists of a set of guidelines to handle security incidents and alerts in the SOC
CLOUDLOGIC KE tweet media
English
1
0
0
13