UP TO 50% OFF on Combo Courses!
D H M S
blog-banner

Cloud computing roles and responsibilities

‘Cloud computing’ is making use of the resources such as servers, storage, networking and software over the Internet.  Since cloud computing offers the pay-as-you-go model for enterprise applications, it is a much more sought after business model for enterprise applications. The cloud computing model is ...

read more

CCPA vs GDPR

Laws such as CCPA and GDPR have been designed keeping the ‘privacy’ aspect in mind. With many privacy violations rocking the business world, the design and implementation of CCPA and GDPR have become imperative. CCPA is ‘California Consumer Privacy Act’ and is slated to come into effect on Jan ...

read more

How to prepare for AWS Certified Security – Specialty

With ‘Cloud computing’ completely overhauling today’s business scenario, AWS, Microsoft Azure and many other vendors are entering the business landscape today. AWS or ‘Amazon web services’ is a leading cloud service provider that powers startups and established organizations with services such as st...

read more

Yet another Whatsapp vulnerability:

Close on the heels of the ‘Pegasus’ spyware, the Internet was again abuzz with yet another Whatsapp vulnerability on Monday, 18th November 2019. This time: Hackers send a specially crafted .mp4 file to a Whatsapp user which could trigger a stack based buffer overflow. This could enable the hac...

read more

All about Pegasus!

It did happen again. Even as most of us were touting Whatsapp to be the most secure messaging platform, another attack on the world’s most popular messanging platform shook everybody…again! As an introduction, Whatsapp is end-to-end encrypted messaging platform that was supposedly the most secure commu...

read more

Public cloud vs Private cloud: Security challenges

“Cloud” is yet another new kid on the block and is definitely turning heads in the tech world. Cloud service providers like AWS, Microsoft Azure, Google cloud platform (GCP) along with others have taken the technology world by storm. As businesses grow they need more resources to expand – more power, mo...

read more

Should Facebook have end-to-end encryption?

Being a privacy warrior myself, I always believe that all conversations in the digital medium be kept private and not be recorded or observed by anybody else in an unpermitted way. This is the fundamental thought that brings the concept of ‘end-to-end encryption’ to the fore. What is end-to-end encrypt...

read more

How Bad Will Ransomware Attacks Really Get?

It seems everywhere you turn – you hear the word “ransomware” and files being encrypted. ‘Ransomware’ might have been a foreign word in times gone by – but today it is a better known word – thanks, be to the bombardment of such attacks in our lives. ‘Ransomware’is a type of malware that lock...

read more

What is ‘SOC’?

Does your organization need a SOC team? While that point is highly debated and some organizations find it an absolute necessity and pay attention to forming one right away – there are still many others who only learn by a bad experience. But exactly what is ‘SOC’ and who are the different security pe...

read more

Ethical Hacking vs Pen Testing

“Hacking” is the first thought that comes automatically to one’s mind when you mention “Information security”. From the sublime Computer professional to the amateur computer user, everyone understands the term perfectly. With technological advances, hacking and other exploits have shown an exponenti...

read more
TOP
whatsapp