EC2 Image Builder is a fully managed AWS service that makes it easier to automate the creation, management, and deployment of customized, secure, and up-to-date…
Services by AWS
Databases (DB) in AWS : These are stored on EFS, EBS, EC2 , Instances , S3 Relational DB : – These are like Excel spreadsheets…
IoT the Next Cobweb
In the world today where we are breathing through masks, due to the pandemic times, where mostly all are working from home. Businesses need to…
Cyber Strategies in the New Normal
We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write…
What is Web Application and OWASP?
OWSAP – Open Web Application Security Project is a non-profit organization that dedicates web application security. What is the OWASP Top 10? It lists out…
What do you mean by Virtualization & Hypervisor?
Virtualization refers to the creation of a virtual resources such as a server, desktop, operating system, file, storage or network. A simple definition of virtualization is…
What is Hardware Security?
To know about the hardware security, lets first understand what all is covered under hardware security here : Mobile Device Security (MDS) IoT Security Vulnerable…
What we know about IoT Security?
What is Internet of Things (IoT)? We read a lot about IoT, but not clear what exactly it means, although we know about its definition…
What is Threat Intelligence?
The information which an organization uses to understand the threats or issues that are targeting their organization. The primary purpose of this type of security…
What is DDoS Mitigation Services?
You may be aware of what is DDoS attacks or what is DoS, if still, it is unclear please go through our previous blogs for…