Information Security is also known as InfoSec, it is all about securing information from unauthorised access which can be done through tools, processes deployed to…
Artificial Intelligence (AI) to combat with COVID19
AI technology to be applied during this epidemic time of COVID19 as it can be most effective by the brainstorming of IT leaders and Medical Superintendents. Question which…
What is SSL Certificate?
SSL stands for Secure Socket layer , which acts as a backbone of our secure internet which protects small data files that digitally bind a…
What is MS Intune?
MS Intune is a cloud-based management solution which provides mobile and OS device management. To give you an example of MS intune, as in when…
Good practices to be followed for FireWalls to avoid cyberattacks
What are Firewalls? What are Firewalls? Firewalls are the network security systems which monitors the incoming and outgoing network traffic as per the pre-determined rules…
What is API?
API stands for Application Programming Interface. It is defined how two pieces of software talk to eachother. Types of APIs: 1) Web ( Rest,…
Kinds of Cyber Attacks
On a time when the world is getting locked down due to COVID19 which is a deadly virus and very contagious thanks to the Wuhan…
Network Protocols the Formula One of IP Tracks
Whenever a novice lands in a network domain, he or she gets tangled in the new technical jargons or abbreviations which are being widely used…
Cyber Crime on a Roll, CyberSecurity still catching up..!!
Not a week ago that we don’t hear about a breach or identify theft, there are security devices such as Firewalls, Switches, Routers, NIDS/NIPS, VPN…
Similarities between Cloud Computing and Pizza
Today, we all talk about cloud, but some of us are unaware of it, some say yes it is something to deal with the cloud…