top of page
©
Search
Guralingappa
Jan 16, 20232 min read
The Dark Side of Cyber Crime
Cybercrime, also known as computer crime, is a rapidly growing problem in today's digital world. With the increasing use of technology in...
45 views0 comments
manju devaraj
Nov 27, 20223 min read
Which Organization Culture type is the right fit for your organization?
Introduction Organizational culture is the underlying beliefs, assumptions, values & ways of interacting that contribute to that unique...
42 views0 comments
manju devaraj
Jul 27, 20214 min read
802.11 Wi-Fi Architecture
Introduction Wireless networks often extend an existing wired infrastructure. The wired infrastructure may be quite complex to begin...
28 views0 comments
RaviTeja
Jul 27, 20211 min read
Container Service's
Container works as PaaS? Containers service relies on the OS-level virtualisation to deliver the software by using Docker and Kubernetes....
23 views0 comments
manju devaraj
Apr 28, 20213 min read
Secure your DNS with DNSSEC
DNSSEC was designed primarily to defend against the DNS vulnerabilities like cache poisoning & MITM. Lack of Stronger authentication in...
27 views0 comments
manju devaraj
Apr 26, 20211 min read
Some of the Linux based Security Compliance tools ....
1. Lynis - Helps in system hardening and compliance testing of Linux systems . https://cisofy.com/lynis/ 2. OpenSCAP - useful in...
17 views0 comments
manju devaraj
Mar 23, 20211 min read
PCI-DSS 3.2.1 Auditing AWS & Linux VM's on cloud
Refer to SAN's Methodology for Firewall Reviews for PCI Compliance . Thank you
85 views0 comments
manju devaraj
Mar 2, 20212 min read
A quick dive into Bitcoins/Blockchain, security controls & more ...
It all started with the Peer-to-Peer Electronic Cash System" by Satoshi Nakamoto in 2008, it started with the word Bitcoin in his paper...
62 views0 comments
manju devaraj
Feb 24, 20211 min read
Tips around WordPress Security - Your Smart Defence
For more details on WordPress XSS Attack (Cross Site Scripting) - How To Prevent? refer to this web page (wphackedhelp.com) Thanks
30 views0 comments
AjayaSimha
Jan 29, 20213 min read
36 views0 comments
Vaibhav Y
Dec 23, 20203 min read
Cyber Security has become a new basic need & the basic norm !
Cyber Security has become a basic need with the Digital transformation in effect across all streams of life We constantly seeing new...
19 views1 comment
Shubham C
Dec 21, 20204 min read
Dorking your way in!
Google Hacking is evergreen topic in Cyber Security. They said if you can’t use google at his best you are not really a hacker. Before we...
489 views1 comment
manju devaraj
Jul 22, 20202 min read
PCI DSS Control challenges
Suggestion to implement effective and adequate network segmentation to be able to reduce PCI-DSS scope? Do not Mix & create a Mess, ...
20 views0 comments
manju devaraj
Jul 12, 20201 min read
Mandatory & Timely Risk Assessment & Management process requirement for PCI DSS Standards .
Mandatory requirements around Scan & testing which has to be taken care . 1. Internal VA Scans For all in Scope Systems, ex. Nessus...
22 views0 comments
manju devaraj
Jun 30, 20202 min read
Some facts about the PCI DSS Standards & the way its being Assessed .
PCI DSS is for the environment processing , transmitting & storing Card Holder Data . What if any of the business cannot mitigate a GAP ,...
26 views0 comments
bottom of page