Image
1.9 K
Views
1st June 2020 1865

Common Cyber Security Threats In Manufacturing Industry

A couple of decades before, security was meant like “none should steal my computer or mobile” i.e., More of a physical appand so has the meaning for security

Image
1.8 K
Views
28th May 2020 1752

How to choose the right security provider

In last decade, companies and individuals have seen the real impact of cyber security threats from all industries and even related to government.

Image
1.6 K
Views
27th May 2020 1590

How to educate vendor management team in selecting the right vendors for securing

Vendor management enables an ongoing development of the third-party vendors through frequent collaboration....

Image
2 K
Views
29th April 2020 2035

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

Image
2.5 K
Views
27th April 2020 2511

Why large organizations suffer frequent cyber-attacks than smaller ones?

We often feel lazy or forget to carry things to our office. So, we need everything to be in our machine and due to lack of space.

Image
2.4 K
Views
27th April 2020 2390

Training Employees on Social Engineering Attacks

Amateurs Hack Systems, Professionals Hack People According to this saying, Social Engineering is a security term that may be mostly heard around in corporate offices.

Image
3.7 K
Views
14th April 2020 3711

A Deep Dive into SAML-SSO Security Testing Approach

SAML the Security Assertion Markup Language was created by an organization known as OASIS.Nowadays applications make use of the latest version of SAML 2.0.

Image
1.8 K
Views
7th April 2020 1841

Dumpster Diving-Your Unused Modem Hardware can Leak Your Critical Data

We will all be familiar with the attack surfaces in web,mobile,network and cloud technologies but haven’t you heard about the hardware

Image
1.3 K
Views
3rd April 2020 1274

Data Protection in India

In India, there was a dramatic change in the last one decade with the latest trends and technologies implemented in the Government Bodies / Corporate Sectors and data has been transmitted through different channels

Image
2 K
Views
10th March 2020 2012

Security Challenges In RFID : It is Not as Difficult as You Think

RFID is a device which works basically on the electromagnetic waves. Its operating frequency varies from 135KHz - 5.8GHZ and these are closely coupled circuits.

Image
1.4 K
Views
26th November 2019 1351

Detailed Insights On Ipv6 Implementation And Its Security Related Aspects

Internet Protocol (IP) is a system that allows hosts to identify and connect to other hosts online. Ipv4 was implemented in the early 80s.