top of page



©
Search


The Dark Side of Cyber Crime
Cybercrime, also known as computer crime, is a rapidly growing problem in today's digital world. With the increasing use of technology in...
Guralingappa
Jan 16, 20232 min read
48 views
0 comments
Which Organization Culture type is the right fit for your organization?
Introduction Organizational culture is the underlying beliefs, assumptions, values & ways of interacting that contribute to that unique...
manju devaraj
Nov 27, 20223 min read
42 views
0 comments
802.11 Wi-Fi Architecture
Introduction Wireless networks often extend an existing wired infrastructure. The wired infrastructure may be quite complex to begin...
manju devaraj
Jul 27, 20214 min read
32 views
0 comments

Container Service's
Container works as PaaS? Containers service relies on the OS-level virtualisation to deliver the software by using Docker and Kubernetes....
RaviTeja
Jul 27, 20211 min read
24 views
0 comments
Secure your DNS with DNSSEC
DNSSEC was designed primarily to defend against the DNS vulnerabilities like cache poisoning & MITM. Lack of Stronger authentication in...
manju devaraj
Apr 28, 20213 min read
27 views
0 comments
Some of the Linux based Security Compliance tools ....
1. Lynis - Helps in system hardening and compliance testing of Linux systems . https://cisofy.com/lynis/ 2. OpenSCAP - useful in...
manju devaraj
Apr 26, 20211 min read
17 views
0 comments

PCI-DSS 3.2.1 Auditing AWS & Linux VM's on cloud
Refer to SAN's Methodology for Firewall Reviews for PCI Compliance . Thank you
manju devaraj
Mar 23, 20211 min read
87 views
0 comments


A quick dive into Bitcoins/Blockchain, security controls & more ...
It all started with the Peer-to-Peer Electronic Cash System" by Satoshi Nakamoto in 2008, it started with the word Bitcoin in his paper...
manju devaraj
Mar 2, 20212 min read
62 views
0 comments


Tips around WordPress Security - Your Smart Defence
For more details on WordPress XSS Attack (Cross Site Scripting) - How To Prevent? refer to this web page (wphackedhelp.com) Thanks
manju devaraj
Feb 24, 20211 min read
30 views
0 comments
AjayaSimha
Jan 29, 20213 min read
36 views
0 comments
Cyber Security has become a new basic need & the basic norm !
Cyber Security has become a basic need with the Digital transformation in effect across all streams of life We constantly seeing new...
Vaibhav Y
Dec 23, 20203 min read
19 views
1 comment
Dorking your way in!
Google Hacking is evergreen topic in Cyber Security. They said if you can’t use google at his best you are not really a hacker. Before we...
Shubham C
Dec 21, 20204 min read
533 views
1 comment
PCI DSS Control challenges
Suggestion to implement effective and adequate network segmentation to be able to reduce PCI-DSS scope? Do not Mix & create a Mess, ...
manju devaraj
Jul 22, 20202 min read
20 views
0 comments
Mandatory & Timely Risk Assessment & Management process requirement for PCI DSS Standards .
Mandatory requirements around Scan & testing which has to be taken care . 1. Internal VA Scans For all in Scope Systems, ex. Nessus...
manju devaraj
Jul 12, 20201 min read
22 views
0 comments
Some facts about the PCI DSS Standards & the way its being Assessed .
PCI DSS is for the environment processing , transmitting & storing Card Holder Data . What if any of the business cannot mitigate a GAP ,...
manju devaraj
Jun 30, 20202 min read
26 views
0 comments
bottom of page