Introduction to Cybersecurity for Small Businesses
In a world interwoven with digital threads, small and medium-sized enterprises (SMEs) need to navigate safely through...
How to Protect Against Ransomware Attacks
Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to...
Private emails, why is it a bad decision?
Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead...
Gulf Countries and Data Security Breaches
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war...
Microsoft patches Zero Day vulnerability
In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in various MS products...
Another set of Celeb Leaks
After Jennifer Lawrence it is now time to see what hackers have about Kim Kardashian. Private photographs of Kim...
Google Hacking – FBI warns public
Google Dorking, Also known as “Google hacking,” involves using specialized search parameters to locate very specific...
OWASP AppSec Tutorial Series
Here is a list of videos published in YouTube about application security. It is a great compilation of video and a...
Identity Protection Services
Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies...
Cloud Security Report–Spring 2014
The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based...
Whitelisting in Java
Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts...
Encryption and Security, think again
NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes the strategies by...
WireShark Tutorial
Wireshark is a one among the top sniffing tools used by any network / security analysts. Here are to great videos on...
Privileged account management solutions
Privileged accounts like System Administrators and Network Administrators have elevated privileges in a system....
NMAP Tutorials–Video
Most of us use nmap as a tool for performing security assessments. NMAP helps us in many ways. When we built a team...
Enterprise Information Security
Enterprise Information Security is receiving a lot of attention these days. Especially with the wide reach of media...
PCI DSS & Network Devices
PCI DSS requirements say many things about network security to make the card holder data safe and protected when it is...
Advanced Persistent Threats – Detection
When an attacker targets someone or some organization (target) to obtain or change information using ways that are...
CSA releases SecaaS Implementation Guidance for Identity and Access Management
In the recent past CSA has defined the categories of security services that can be offered as Security as a Service....
Cloud Security Alliance Guidance on Security as a Service (SecaaS)
The CSA (Cloud Security Alliance) has issued a new guideance with a focus on how security can be provided as a service...