Jun 30, 2020 |
CISSP, CompTIA, EC Council, ISACA | 13911
‘CISSP’ or the ‘Certified Information Systems Security Professional’, CISM or the ‘Certified Information Systems Auditor’, CASP or the ‘CompTIA Advanced Security Practitioner’ and CCISO or ‘Certified Chief Information security officer’ are all Information security domain’s leading certif...
read more
Jun 15, 2020 |
Information Security | 1787
‘Endpoint security’, ‘Perimeter security’, ‘Security by obscurity’, ‘Layered security’ – these are some approaches that are present till date to safeguard business and personal networks. In spite of the different approaches, data breaches, ransomware attacks and other novel ways to gain pers...
read more
Apr 29, 2020 |
CISSP | 7824
The fifth domain of the CISSP certification is ‘Identity and Access Management’. ‘Identity and Access Management’ is one aspect of life that surrounds us all. The candidate is expected to know the following topics in this domain:
“Physical and logical access to assets
Identification and auth...
read more
Apr 21, 2020 |
Information Security | 3458
With the Coronovirus pandemic locking almost every state, city and country in the world, professionals from every sector are working from home to achieve their business objectives. ‘Zoom’ the video conferencing software, has been the leader in powering most businesses in this difficult time. ‘Zoom’ ...
read more
Mar 16, 2020 |
Information Security | 3265
The world is in the midst of the deadliest Coronavirus pandemic and we can see business slowing, transportation disruptions, schedules being uprooted, educational institutions closing and many other changes in our lives. Even as the nature of crisis is magnanimous and dangerous, there are quite a few who ...
read more
Feb 19, 2020 |
Sailpoint | 2569
Before we get into understanding ‘SailPoint’ it is necessary to understand what is meant by ‘Identity and Access management’ and where it is used. ‘Identity and Access Management’ is one of the security frameworks which consists of various rules and regulations that, is needed by most organization...
read more
Feb 4, 2020 |
ISC2 | 1607
The cybersecurity field is growing by leaps and bounds today. With the constant growth of technology, threat vectors such as data breaches, ransomware attacks, viruses and malware have grown too. The need to defend corporations and tackle different security challenges is the need of the hour and a strong cybe...
read more
Jan 25, 2020 |
Information Security | 1542
iPhones are more secure than Android phones? Think again… Jeff Bezos, the founder, President and Chief Executive officer of Amazon had his iPhone 10 hacked in 2018 and the details are still being revealed.
Any connected device is vulnerable to a variety of hacks and attacks. With smart phones storing...
read more
Jan 17, 2020 |
AWS, Microsoft AZURE | 4307
Cloud computing has become a major player to reckon with storing pictures, documents and doing computations and many other things moving to the cloud, Cloud providers are constantly gaining in popularity due to the increased demand for their services. AWS, Azure and GCP are some of the popular cloud service p...
read more
Jan 7, 2020 |
Information Security | 1275
The New Year is already upon us but who can forget the Capital Data breach, the Canva hack and the various ransomware incidents that shook the various organizations the past year? With so many hacks and attacks in 2019, what can we expect from 2020? Read on to see some of our predictions!
Ransomware ...
read more