Featured Posts (244)

Sort by

Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue incr

Read more…

Workshop: CASB - Part 2

CASB Workshop Part 2 by Gaurav Bhatia:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers 

CASB Workshop Part 2 Video by Gaurav Bhati

Read more…
Views: 173
Comments: 0

Workshop: CASB - Part 1

CASB Workshop Part 1 by Bikash Barai:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers


 
CASB Workshop Part 1 Video by Bikash Barai:
Read more…
Views: 124
Comments: 0

Workshop: Network Forensic Tools & Techniques

Network Forensic Tools & Techniques Workshop by Tamaghna Basu:  

  • Introduction,Basic Protocol Analysis,
  • Forensic Analysis Network/Web/Malware,
  • Basic Packet Analysis Challenges

Network Forensic Tools & Techniques Workshop video by Tamaghna Basu:  

Read more…
Views: 164
Comments: 0