Tanya Austin

Tanya Austin

Cybersecurity Specialist, ManageEngine  

Tanya is a seasoned cybersecurity specialist with extensive experience in SIEM solutions. Fluent in the MITRE ATT&CK framework and adept at demystifying the alphabet soup of compliances like HIPAA and CPRA, she helps organizations build robust digital defenses. Her expertise in SIEM solutions ensures that threats are spotted and squashed with efficiency. When she's not thinking about what hackers may be plotting, Tanya can be found exploring culinary delights, pushing her limits at her workouts, or lost in the pages of a captivating book. She believes that understanding cybersecurity doesn't have to be a long-drawn out affair, and her writing aims to provide strategic ways to defend organizational networks. Consider her your guide to a more secure enterprise.

More by Tanya Austin

Articles Guides Podcasts Infographics
 
Building a privacy-first brand under the DPDPA: The CISO’s cookie strategy

Compliance

Building a privacy-first brand under the DPDPA: The CISO’s cookie strategy

 
Healthcare

Healthcare

Pixel, procedure, and privacy: Why cosmetic clinics need a cybersecurity makeover

 

Compliance

How to enhance incident response and breach notification compliance under the DPDP Act with a SIEM solution

 
Transforming enterprise consent management: Instilling compliance and trust under the DPDP Act

Compliance

Transforming enterprise consent management: Instilling compliance and trust under the DPDP Act

 
K-12 cybersecurity: Safeguarding students from cyberbullying and harmful online content

Education

K-12 cybersecurity: Safeguarding students from cyberbullying and harmful online content

 
The CISO’s compass: Strategic responses to cyber breaches

Guides

The CISO’s compass: Strategic responses to cyber breaches

 
Getting the best out of your SIEM- The handbook for security analysts

Guides

Getting the best out of your SIEM- The handbook for security analysts

 
A security analyst's guide to- Understanding Ransomware- The Healthcare edition

Guides

A security analyst's guide to- Understanding Ransomware- The Healthcare edition

 
The MITRE ATT&CK under the microscope

Guides

The MITRE ATT&CK under the microscope

 
Combating hacking techniques: How to defend against DDoS, ransomware, and cryptojacking

Guides

Combating hacking techniques: How to defend against DDoS, ransomware, and cryptojacking

 
Exploring the Methodology of DDoS Attacks

Guides

Exploring the Methodology of DDoS Attacks

 
The Security Sleuth Podcast

Podcasts

The Security Sleuth Podcast

 
8 Must Do Cybersecurity Practices for Organizations Everywhere

Infographics

8 Must Do Cybersecurity Practices for Organizations Everywhere

×