Author: Vinit Sinha (Head – Information Security, Cyber Security and Data Privacy, Pine Labs) Ransomware is a specific type of malware (malicious software) designed to... Read More
Author: Manish Sehgal (Chief Information Security Officer (CISO), AU Small Finance Bank Limited) Network security has become crucial to computer users, military, private, and government... Read More
Author: Rakesh Sharma (Technical Information Security Officer (TISO), Citi) When organizations get hacked: How disaster recovery and business continuity professionals save the day. Disaster Recovery... Read More
Author: Salman Khwaja (Manager Application Security, TPS Pakistan Pvt. Ltd.) Maintaining a SOC (Security Operations Center) is an important status symbol for various organizations. A... Read More
Author: Puneet Mehta (Chief Technologist & Principal Advisor, Global Advisory Service, SDG Corporation) Social engineering is on the rise, and organizations need to respond to... Read More
Creating and staffing a network security program is a major headache for network security professionals. Everyone wants highly qualified professionals that can contribute to the... Read More
Author: Kunal Sehgal (Former Managing Director for Global Resilience Federation) Abstract: Wireless penetration testing has long been believed to be the most effective way to... Read More
Author: Niamathulla SK (Product Manager – Content Research, EC-Council) Abstract: Cybersecurity plays a vital role in the field of Information Technology (IT). Securing information becomes... Read More
The need for information security is becoming evident with every new data breach report. The emergence of new technologies like virtualization, internet of things, cloud... Read More
A penetration test or ‘pen test’ is the process of evaluating the security infrastructure within a controlled environment to safely attack, identify, penetrate and exploit... Read More
Hacking often refers to the unauthorized intrusion into a network or computer, normally carried out by one or more “hackers.” However, a hacker can be... Read More