UP TO 50% OFF on Combo Courses!
D H M S
blog-banner

Certified Threat Intelligence Analyst

New viruses, malware are found at the drop of a hat. No sooner, do we grapple with one new set of malware – do we come across a totally new malware the next day. In addition to this, most organizations are filled with even more unknown threat agents that are not visible to all. Organizations now demand a pr...

read more

CISSP Or CCSP – Which is better?

In order to understand whether CISSP or CCSP is better, it is first good to understand both the certifications and their details clearly. Let us first understand the CISSP certification. CISSP: CISSP or the ‘Certified Information Systems Security Professional’ from (ISC)2 is the most demanded cer...

read more

DDoS Attacks: How They Are Evolving

With almost all businesses moving online, what would happen if it was unavailable even for a few hours in a day? Business would slump, leads would be lost, new business relationships cannot be forged, profits would fall and this may lead to other disasters within the organization as well. This is exactly what...

read more

Analysis of the ‘Capital One’ Data Breach

It seems that breaches, malware, phishing and more types of attacks are what we wake up to every morning. While most are benign attacks do not do much except for an occasional click of the mouse on the Internet or a raised eyebrow, it is the serious ones that cause personal and financial damages. By now, e...

read more
Federated identity management

Federated identity Management

‘Federated identity management’ has its origins in the concepts of ‘Single sign on’ and ‘Identity management’. In order to completely understand ‘Federated identity management’ we have to skim through these concepts first. ‘Identity management’ is authenticating and authorizing differen...

read more
Whatsapp vulnerability

Whatsapp vulnerability: What you should know

As most of us may be aware, Whatsapp is a free, popular cross-platform messaging service by means of which one can send text messages, voice messages, images, documents and make video calls. It is owned by Facebook and is currently used by over 1.5 billion people worldwide. The conversations that take place o...

read more

CISA Job Practice (Old vs New)

‘Certified Information systems auditor’ or popularly known as ‘CISA’ is a world-renowned certification from ISACA. This coveted CISA certification is for IT auditors or security professionals who would like to showcase their audit experience, skills and knowledge. The new CISA job practice comes in...

read more

New CCSP vs the old CCSP

As many of you may be aware, the new CCSP exam is coming into effect on August 1st ,2019.  We have tabulated some of the changes that are being made from the old CCSP to the new CCSP exam. Here are the old CCSP domains and weightage vs the new CCSP domains and weightage: Old CCSP domains and weight...

read more

Different Types of Cryptography Attacks

Cryptography involves hiding the information to be transmitted so that only the receiver is able to view it. This is done by encoding the information to be sent at the sender’s end and decoding the information on the receiver’s end. The field of cryptography is an old one and dates back to 2000 B.C. in...

read more

Domain 3: Security Architecture and Engineering

The third domain of the CISSP exam ‘Security Architecture and Engineering’ focuses on different processes, standards, structures to design a secure information system (An information system  comprises of the operating system, network, equipment, and applications) These are some of the following objective...

read more
TOP
whatsapp