• Home
  • Authors
  • Karishma Asthana

About Karishma Asthana

Karishma Asthana

Karishma is a Product Marketing Manager at Cybereason. She was previously with Accenture Security where she worked as a penetration tester and was responsible for helping clients understand and manage their security vulnerabilities. Karishma is passionate about exploring large shifts in the cybersecurity industry from a technical and strategic point of view.

All posts by Karishma Asthana

The U.K. Cyber Strategy: Developing Cybersecurity Skills, Knowledge and Culture

Greg Day, Cybereason’s VP and Global Field CISO for the EMEA region, offers his perspective on developing cybersecurity skills, knowledge, and culture...

May 3, 2022 / 3 minute read

The U.K. Cyber Strategy and Minimizing the Impact of Cybersecurity Incidents

Cybereason XDR supports the U.K. Cybersecurity Strategy objective of minimizing the impact of cybersecurity incidents...

April 28, 2022 / 2 minute read

Detecting Cyber Events is Key to U.K. Cybersecurity Strategy

Cybereason XDR supports both capability outcomes outlined in the U.K. Government Cybersecurity strategy for detecting cyber events...

April 11, 2022 / 3 minute read

How Cybereason Enables the U.K. to Defend Against Cyberattacks

The second installment of our five-part series outlining how Cybereason XDR maps to each of the objectives in the U.K. Government Cybersecurity Strategy...

March 31, 2022 / 3 minute read

Cybereason Support for the U.K. Cybersecurity Strategy Part 1

This is the first installment of a five-part blog series in which we will outline how Cybereason XDR maps to each of the five objectives contained in the U.K. Government Cybersecurity Strategy...

March 24, 2022 / 4 minute read

Two Things Every Zero Trust Initiative Must Have

Achieving Zero Trust requires planetary-scale telemetry and the ability to analyze and correlate it all in real-time - that means Cybereason XDR powered by Google Cloud....

February 24, 2022 / 2 minute read

Building Enterprise Immunity with XDR

Robust protection mechanisms are not as binary as saying “good file” and “bad file” or “good user” and “bad user.” You must understand the interactions between malicious actors (or even suspicious actors) and your environment...

January 10, 2022 / 2 minute read

Under the Hood: What Artificial Intelligence on the Endpoint Looks Like

Predictive Ransomware Protection, a revolutionary AI-based endpoint protection solution, detects attacks at the earliest stages in real-time by bringing artificial intelligence to each and every endpoint...

December 6, 2021 / 3 minute read

Ransomware Head to Head: Why Does Cybereason Anti-Ransomware Win Over SentinelOne?

Every organization needs to defend effectively against the growing threat of ransomware, so it's important to have the right tools. Cybereason is undefeated against ransomware and beats SentinelOne...

November 1, 2021 / 3 minute read

Three Secrets to Ending Ransomware

Ending ransomware is about minimizing the window of time between the moment when a ransomware attack infiltrates your environment and the moment when you’re able to detect it and respond to it...

October 20, 2021 / 3 minute read