Sep 2, 2019 |
EC Council | 1420
New viruses, malware are found at the drop of a hat. No sooner, do we grapple with one new set of malware – do we come across a totally new malware the next day. In addition to this, most organizations are filled with even more unknown threat agents that are not visible to all. Organizations now demand a pr...
read more
Aug 24, 2019 |
CCSP, CISSP | 3967
In order to understand whether CISSP or CCSP is better, it is first good to understand both the certifications and their details clearly.
Let us first understand the CISSP certification.
CISSP:
CISSP or the ‘Certified Information Systems Security Professional’ from (ISC)2 is the most demanded cer...
read more
Aug 20, 2019 |
Information Security | 1485
With almost all businesses moving online, what would happen if it was unavailable even for a few hours in a day? Business would slump, leads would be lost, new business relationships cannot be forged, profits would fall and this may lead to other disasters within the organization as well. This is exactly what...
read more
Aug 6, 2019 |
EC Council | 2055
It seems that breaches, malware, phishing and more types of attacks are what we wake up to every morning. While most are benign attacks do not do much except for an occasional click of the mouse on the Internet or a raised eyebrow, it is the serious ones that cause personal and financial damages.
By now, e...
read more
Jul 18, 2019 |
Information Security | 2046
‘Federated identity management’ has its origins in the concepts of ‘Single sign on’ and ‘Identity management’. In order to completely understand ‘Federated identity management’ we have to skim through these concepts first.
‘Identity management’ is authenticating and authorizing differen...
read more
May 17, 2019 |
Information Security | 1264
As most of us may be aware, Whatsapp is a free, popular cross-platform messaging service by means of which one can send text messages, voice messages, images, documents and make video calls. It is owned by Facebook and is currently used by over 1.5 billion people worldwide. The conversations that take place o...
read more
Apr 18, 2019 |
CISA | 2499
‘Certified Information systems auditor’ or popularly known as ‘CISA’ is a world-renowned certification from ISACA. This coveted CISA certification is for IT auditors or security professionals who would like to showcase their audit experience, skills and knowledge.
The new CISA job practice comes in...
read more
Mar 25, 2019 |
CCSP | 2413
As many of you may be aware, the new CCSP exam is coming into effect on August 1st ,2019. We have tabulated some of the changes that are being made from the old CCSP to the new CCSP exam.
Here are the old CCSP domains and weightage vs the new CCSP domains and weightage:
Old CCSP domains and weight...
read more
Mar 25, 2019 |
General | 51042
Cryptography involves hiding the information to be transmitted so that only the receiver is able to view it. This is done by encoding the information to be sent at the sender’s end and decoding the information on the receiver’s end.
The field of cryptography is an old one and dates back to 2000 B.C. in...
read more
Mar 21, 2019 |
CISSP | 3411
The third domain of the CISSP exam ‘Security Architecture and Engineering’ focuses on different processes, standards, structures to design a secure information system (An information system comprises of the operating system, network, equipment, and applications) These are some of the following objective...
read more