Jun 13, 2018 |
General | 1310
Technology advancements has led to huge interest in NGTs (next-generation technology), like digital transformation (DX), DevOps, cloud, AI and IoT. These technologies are leading to a bright future increasing efficiencies, greater business agility, better customer engagement and cost savings. However we can...
read more
Jun 11, 2018 |
General | 1202
The startling revelations about Cambridge Analytica, a data analytics firm that worked with Donald Trump’s election team and the winning Brexit campaign, obtaining Facebook data on 50 million users has got everyone thinking about their social media accounts and a possible misuse of it.
According to a sna...
read more
Jun 7, 2018 |
CISSP | 1214
The Asset Security (Protecting Security of Assets) domain focuses on controls such as data classification, clearances, labels, retention, and ownership of data. It discusses about different storage devices and controls determination, including standards, scoping, and tailoring. Data protection skills are at...
read more
Jun 5, 2018 |
CISSP | 1379
The Security and Risk Management domain focuses on risk analysis and mitigation. This domain also details security governance, or the organizational structure required for a successful information security program. It also covers IT policies, procedures, roles and responsibilities, types of controls, risk m...
read more
May 9, 2018 |
General, Information Security | 1309
Bitcoin was a nonexistent term in the past but now it is catching up really fast and grabbing everyone’s interest. Bitcoin is a cryptocurrency, well what is that? It is virtual money based on the technique of cryptography, not owned by any individual, corporation or government. It simplifies payments, m...
read more
May 9, 2018 |
CISSP, General, Information Security | 2515
Although Certified Information Systems Security Professional certification is a instant enhancement to a person’s resume, there are other CISSP concentrations as well which equip professionals in a better and more encompassing way. They not only provide better salaried jobs but also with lot more responsibi...
read more
May 9, 2018 |
General, Information Security | 1287
Data protection the more passionate companies are towards protecting their data, the more determined hackers are in invading your space, your priority files and your chances of success. There are various anti-hacking techniques at work, but these don’t deter the hackers but that is because it is importa...
read more
Apr 24, 2018 |
General | 1251
C.A.T.! This isn’t your usual meaning of the word ‘CAT’; it’s neither the animal nor the common admission test taken in India by MBA aspirants. It stands for Computer Adaptive Test.
Haven’t heard about it before? You must not be acquainted with the name but I am sure you have seen how it works...
read more
Mar 26, 2018 |
General | 1590
Amidst the trending news, Facebook Data Breach has been a highlight given the large customer database and is a message to all other organizations and users to protect their information.
The first step for users should be leaving sites that have any connection to any security breaches, any gaming or quiz si...
read more
Mar 21, 2018 |
Information Security | 1522
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
More than 300 penetration testing tools: After reviewing every tool that was included in Ba...
read more