All Posts (2226)

Sort by

The term ‘Cyber Domain’ has been used widely by various experts, sometimes interchangeably with ‘Cyber Space’, to imply – “the global domain within the information environment that encompasses the interdependent networks of information technology inf

Read more…

We are thrilled to have received so many wonderful ideas and suggestions during the breakfast series specifically focusing on CPI findings. Here are the quick highlights!

What was the objective of the Community Breakfast?

  • Preview of CPI Findings: T
Read more…

Incident Management Guide: Ways to categorize Incidents

Based on Type of Attack: 

  1. Malware : Malicious code has been successfully  logged into business infrastructure

  2. Unauthorized access (user/admin/other privilege escalations) : Any privilege escalations or access gained which should otherwise be denied
Read more…
Views: 15
Comments: 0

Top traveller spots from Delhi

Delhi is the capital of India and is almost the northern center. It is easily commutable to various popular spots in India, specially the Himalayan Range, Pink City Jaipur, Thar desert and Historical sites like Taj Mahal,Red fort, Kutumb minar etc. H

Read more…
Views: 29
Comments: 0

Second critical category. Default passwords for access to the application

For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw

Read more…

Big Data Security Challenges and Recommendations!

This is a great Big Data webinar(15 min), hosted by CISO Platform and briefly points out the Security Challenges and also Recommends Some Fixes. It is presented by Head of Development at Iviz.

What will you learn:
- Key Insights on Existing Big Data

Read more…
Views: 146
Comments: 0