Skip to content

DocTooLss

"We make Technology EaZy via Docs"

  • Home
  • Contact
  • About
  • Twitter
  • WordPress
  • Online Quiz
    • Twitter
    • WordPress
    • Facebook
    • Medium

Tag: cybersecurity

  • Home
  • cybersecurity
  • Cloud Computing
  • Cyber Security
  • Technology

Clash of the Titans – WhatsApp vs Telegram vs Signal

As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine…

Posted on 17 January 202117 January 2021by: DocTooLss
  • Cyber Security
  • Technology

Cyber Strategies in the New Normal

We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write…

Posted on 12 September 202012 September 2020by: DocTooLss
  • Cyber Security
  • Technology

What is Hardware Security?

To know about the hardware security, lets first understand what all is covered under hardware security here : Mobile Device Security (MDS) IoT Security Vulnerable…

Posted on 9 August 20209 August 2020by: DocTooLss
  • API
  • Cloud Computing
  • Cyber Security
  • IoT
  • Technology

What we know about IoT Security?

What is Internet of Things (IoT)? We read a lot about IoT, but not clear what exactly it means, although we know about its definition…

Posted on 2 August 20204 August 2020by: DocTooLss
  • Cyber Security
  • Technology

What is Threat Intelligence?

The information which an organization uses to understand the threats or issues that are targeting their organization. The primary purpose of this type of security…

Posted on 26 July 202026 July 2020by: DocTooLss
  • Cloud Computing
  • Cyber Security
  • Technology

What is CASB?

CASB stands for Cloud Access Security Breaker, which is a software tool that acts as a barrier between on-premises and a cloud provider’s infrastructure which…

Posted on 11 July 202011 July 2020by: DocTooLss
  • Cyber Security
  • Technology

What is Vulnerability Management?

Vulnerability management (VM) which is a program that consists of a variety of technologies that identify, evaluates, treats, and reports on security vulnerabilities in a…

Posted on 21 June 20201 October 2020by: DocTooLss
  • Cyber Security
  • Technology

What are the Good practices to be followed for End Point Security?

As mentioned in my last post regarding end point security , i As mentioned in my last post regarding end point security , in this blog we will be…

Posted on 7 June 202021 June 2020by: DocTooLss
  • Cyber Security
  • Technology

Artificial Intelligence (AI) to combat with COVID19

AI technology to be applied during this epidemic time of COVID19 as it can be most effective by the brainstorming of IT leaders and Medical Superintendents. Question which…

Posted on 5 May 20207 June 2020by: DocTooLss
  • Cyber Security
  • Technology

What is SSL Certificate?

SSL stands for Secure Socket layer , which acts as a backbone of our secure internet which protects small data files that digitally bind a…

Posted on 3 May 20207 June 2020by: DocTooLss

Posts navigation

Older

Categories

  • API
  • Cloud Computing
  • Cyber Security
  • InfoSec
  • Internet Protocol
  • IoT
  • Proxy
  • Proxy,Router,SIEM,Switch
  • Technology

Calendar

January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Dec    

Tags

AI antispoofing API AWS AWSservices Azure Azureactivedirectory CA CIA CISCO Cloudcomputing cloudsecurity compliance Coronavirus COVID19 cyberattacks cyberexploits cyber security cybersecurity cyberthreats DDoS DDoS protection DNS EC2 encryption Endpoint firewalls Gartner Googlecloud IaaS imagebuilder internet IoT Microsoft Networksecurity PaaS PaloAlto protocol SaaS Security SIEM SNMP SSH technology vulnerabilities
Copyright © 2021 DocTooLss All Rights Reserved | Travel Master by Theme Palace