Dec 21, 2018 |
EC Council, Information Security | 1977
‘Social Engineering’ in the context of information security, refers to the manipulation of people to execute an action or to release confidential information. It can be called a ‘method attack’, where one makes use of persuasion, sometimes abusing the user’s trust, to get information that can be u...
read more
Dec 18, 2018 |
EC Council | 1247
With the immense and continuous growth of technology and popularity of the web world, the business world is left with no other option but to make its presence felt on the internet. That is how the companies, whether big or small are making themselves prone to the cyber security attack.
Fortune firms today,...
read more
Dec 17, 2018 |
CompTIA | 2119
Are you a professional looking for an interesting change in your career but not able to decide where to start from? You are not the only one! There are many others going through the same dilemma and trying to explore various opportunities. Here, you will read about a career opportunity which is interesting in...
read more
Dec 11, 2018 |
CCSP, CISSP | 1494
It seems to be the season of breaches and hacks. With Marriott reporting its breach on November 30, 2018 and Quora reporting its breach on Dec 7, 2018, it seems that hackers are determined to penetrate systems and grab the personal information of innocent users and use it for their gain!
Marriott data breach...
read more
Dec 7, 2018 |
CCSP, CISSP | 1492
The third CCSP domain, ‘Cloud Platform and Infrastructure Security’ carries 19%weightage in the certification exam.
This CCSP domain broadly explains cloud infrastructure components, risks associated with cloud infrastructure, diverse techniques to mitigate risks with extensive security controls and bu...
read more
Dec 5, 2018 |
CCSP, CISSP | 1369
The second CCSP domain is ‘Cloud Data security’. This vast domain evaluates the candidate’s technical understanding of:
Various phases of cloud data life cycle
Cloud data storage architecture including the storage types,security threats and controls
Data security strategies along with other o...
read more
Dec 4, 2018 |
CCSP | 1553
The “Architectural concepts and design requirements” domain from the CCSP certification curriculum, has 19% weight age in the exam. This CCSP domain broadly tests a candidate’s design and security skills in context to the cloud environment and focuses on the following objectives:
Understanding of c...
read more
Nov 25, 2018 |
Information Security | 1352
We all would agree to the fact that internet today has become an inseparable part of our lives. At the same time we are also aware that the convenience of the internet, along with itself has brought a threat to cyber security. The news of personal datas getting hacked doesn’t even surprise us anymore. Even ...
read more
Nov 24, 2018 |
Ransomware, Zoziel Freire | 1567
What is ‘Ransomware’ and how does it work?
With advances in technology, it has become a big battle to keep our environment safe. There are new kinds of threats being created everyday which aim to target servers and network systems. The managers need to be prepared against these threats, using support too...
read more
Jul 19, 2018 |
CISA | 1619
1. What is the CISA certification?
Certified Information Systems Auditor, CISA is a globally valued certification devised and offered by ISACA that helps IT professionals gain expertise in monitoring, managing, and protecting the IT and business systems in the organizations. Passing the CISA certificatio...
read more