UP TO 50% OFF on Combo Courses!
D H M S
blog-banner

CISSP vs CISM vs CASP vs CCISO

‘CISSP’ or the ‘Certified Information Systems Security Professional’, CISM or the ‘Certified Information Systems Auditor’, CASP or the ‘CompTIA Advanced Security Practitioner’ and CCISO or ‘Certified Chief Information security officer’ are all Information security domain’s leading certif...

read more

Zero Trust Security

‘Endpoint security’, ‘Perimeter security’, ‘Security by obscurity’, ‘Layered security’ – these are some approaches that are present till date to safeguard business and personal networks. In spite of the different approaches, data breaches, ransomware attacks and other novel ways to gain pers...

read more

CISSP Domain 5: Identity and Access Management

The fifth domain of the CISSP certification is ‘Identity and Access Management’. ‘Identity and Access Management’ is one aspect of life that surrounds us all. The candidate is expected to know the following topics in this domain: “Physical and logical access to assets Identification and auth...

read more

Zoom Security

With the Coronovirus pandemic locking almost every state, city and country in the world, professionals from every sector are working from home to achieve their business objectives.  ‘Zoom’ the video conferencing software, has been the leader in powering most businesses in this difficult time. ‘Zoom’ ...

read more

Coronavirus and security scams

The world is in the midst of the deadliest Coronavirus pandemic and we can see business slowing, transportation disruptions, schedules being uprooted, educational institutions closing and many other changes in our lives. Even as the nature of crisis is magnanimous and dangerous, there are quite a few who ...

read more

Introduction to SailPoint

Before we get into understanding ‘SailPoint’ it is necessary to understand what is meant by ‘Identity and Access management’ and where it is used. ‘Identity and Access Management’ is one of the security frameworks which consists of various rules and regulations that, is needed by most organization...

read more

How do I start a career in cybersecurity?

The cybersecurity field is growing by leaps and bounds today. With the constant growth of technology, threat vectors such as data breaches, ransomware attacks, viruses and malware have grown too. The need to defend corporations and tackle different security challenges is the need of the hour and a strong cybe...

read more

Jeff Bezos Phone Hack

iPhones are more secure than Android phones? Think again… Jeff Bezos, the founder, President and Chief Executive officer of Amazon had his iPhone 10 hacked in 2018 and the details are still being revealed. Any connected device is vulnerable to a variety of hacks and attacks. With smart phones storing...

read more

AWS Security vs Azure Security:

Cloud computing has become a major player to reckon with storing pictures, documents and doing computations and many other things moving to the cloud, Cloud providers are constantly gaining in popularity due to the increased demand for their services. AWS, Azure and GCP are some of the popular cloud service p...

read more

Security Gazing into the year 2020!

The New Year is already upon us but who can forget the Capital Data breach, the Canva hack and the various ransomware incidents that shook the various organizations the past year? With so many hacks and attacks in 2019, what can we expect from 2020? Read on to see some of our predictions! Ransomware ...

read more
TOP
whatsapp