With the emerging outbreaks of the pandemic COVID19 the world has come to a standstill. Due to this, there has been a disconnect between cybersecurity executive and their organization’s…
What is Vulnerability Management?
Vulnerability management (VM) which is a program that consists of a variety of technologies that identify, evaluates, treats, and reports on security vulnerabilities in a…
What is PKI?
Questions on your mind? We often read about PKI over the net or on the cybersecurity columns even though we know its full form i.e.…
What are the Good practices to be followed for End Point Security?
As mentioned in my last post regarding end point security , i As mentioned in my last post regarding end point security , in this blog we will be…
What is Endpoint Security?
Endpoints to the generic audience it would be meaning that something which is connected at the end of something as if we are talking about…
What is Patch Management?
To explain you about a patch compliance lets imagine that when you are working out in the morning while lifting those 25kg dumbles you somehow…
Cybersecurity Frameworks
In order to meet with the technical and other requirements, organisations uses Frameworks that provides the best practices and guidelines to assist in improving security…
What is Information Security?
Information Security is also known as InfoSec, it is all about securing information from unauthorised access which can be done through tools, processes deployed to…
Artificial Intelligence (AI) to combat with COVID19
AI technology to be applied during this epidemic time of COVID19 as it can be most effective by the brainstorming of IT leaders and Medical Superintendents. Question which…
What is SSL Certificate?
SSL stands for Secure Socket layer , which acts as a backbone of our secure internet which protects small data files that digitally bind a…