As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine…
Cyber Strategies in the New Normal
We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write…
What is Hardware Security?
To know about the hardware security, lets first understand what all is covered under hardware security here : Mobile Device Security (MDS) IoT Security Vulnerable…
What we know about IoT Security?
What is Internet of Things (IoT)? We read a lot about IoT, but not clear what exactly it means, although we know about its definition…
What is Threat Intelligence?
The information which an organization uses to understand the threats or issues that are targeting their organization. The primary purpose of this type of security…
What is CASB?
CASB stands for Cloud Access Security Breaker, which is a software tool that acts as a barrier between on-premises and a cloud provider’s infrastructure which…
What is Vulnerability Management?
Vulnerability management (VM) which is a program that consists of a variety of technologies that identify, evaluates, treats, and reports on security vulnerabilities in a…
What are the Good practices to be followed for End Point Security?
As mentioned in my last post regarding end point security , i As mentioned in my last post regarding end point security , in this blog we will be…
Artificial Intelligence (AI) to combat with COVID19
AI technology to be applied during this epidemic time of COVID19 as it can be most effective by the brainstorming of IT leaders and Medical Superintendents. Question which…
What is SSL Certificate?
SSL stands for Secure Socket layer , which acts as a backbone of our secure internet which protects small data files that digitally bind a…