Open in app

Sign In

Write

Sign In

Geeky much!
Geeky much!

87 Followers

Home

About

Pinned

Combatting Cyber Bullying: The Bitter Trolls online

If any other title for this post could suffice, I’d choose “Nurturing Values and Self-Esteem: A Vital Remedy in the Digital Age.” October is cyberbullying awareness month. …

Bullying

7 min read

Combatting Cyber Bullying: The Bitter Trolls online
Combatting Cyber Bullying: The Bitter Trolls online
Bullying

7 min read


Aug 10

Can I get cyber-framed?

What do you mean “cyber-framed”? A man was arrested and charged with possession of child pornography, based on digital evidence found on his computer. However, it was later discovered that the evidence had been planted by hackers, and the man was vindicated. A case in which a woman was accused…

Blackmail

3 min read

Can I get cyber-framed?
Can I get cyber-framed?
Blackmail

3 min read


Jul 12

Defensive Cyber Security: SOC, Threat Intelligence, Digital Forensics, Incident Response, and Malware Analysis

In today’s digital landscape, cybersecurity plays a crucial role in safeguarding organizations from malicious threats and ensuring the integrity and confidentiality of sensitive data. This blog post delves into important aspects of cybersecurity, including Security Operations Center (SOC), Threat Intelligence, Digital Forensics, Incident Response, and Malware Analysis. Security Operations Center (SOC):

Blue Team

3 min read

Defensive Cyber Security: SOC, Threat Intelligence, Digital Forensics, Incident Response, and…
Defensive Cyber Security: SOC, Threat Intelligence, Digital Forensics, Incident Response, and…
Blue Team

3 min read


Jun 11

Challenge to Zero Trust Strategy: Unmanageable Applications

A significant majority, 61% to be exact, of websites are deficient in supporting essential features such as Single Sign-On (SSO), and MFA. A zero-trust strategy if fully deployed, can reduce the cost of a breach by 45%

Zero Trust

3 min read

Challenge to Zero Trust Strategy: Unmanageable Applications
Challenge to Zero Trust Strategy: Unmanageable Applications
Zero Trust

3 min read


Jun 9

Empowering Cloud Security Professionals

Why should only people working in security be responsible for security? We have almost all the work shifted from on-premises to the cloud. A lot of employees work in a company. Along with engineers we have GRC people working in regulatory compliance. We have managers and resources looking after operations…

Cloud Security

3 min read

Empowering Cloud Security Professionals
Empowering Cloud Security Professionals
Cloud Security

3 min read


Jun 8

This is how the reCAPTCHA protects payment transactions

ReCAPTCHA Enterprise is an advanced fraud prevention system developed by Google, to protect websites and online services from fraudulent activities. By leveraging machine learning and behavioural analysis, it distinguishes between humans and bots, reducing the risk of account takeover, fake account creation, and other forms of online fraud. It offers…

Security

2 min read

This is how the reCAPTCHA protects payment transactions
This is how the reCAPTCHA protects payment transactions
Security

2 min read


Jun 2

NIST framework crash course...blog

You keep hearing NIST in job descriptions…but what is it anyway? Today we have time to go into it without reading a lot. NIST stands for National Institute of Standards and Technology (NIST) The NIST Cybersecurity Framework provides a set of guidelines, best practices, and standards to help organizations manage…

Nist

2 min read

NIST framework crash course...blog
NIST framework crash course...blog
Nist

2 min read


Published in

Networks & Security

·Mar 31

Dealing with Frequent Requests to Sysadmins

Have you ever been in a situation, wherein, for some software to run on your company-provided device, you need to set your IP address as a parameter so that it can run on some network let’s say your company WIFI or your home network… Do you need to contact again…

Networking

1 min read

Dealing with Frequent Requests to Sysadmins
Dealing with Frequent Requests to Sysadmins
Networking

1 min read


Mar 3

Protecting Your Digital Identity: Navigating Cybersecurity, Data Privacy, and Laws in India

Data privacy has a lot to do with the rights of the end users, the consumers that are using services like Facebook, Twitter or any other products... What is the purpose of the data you provide to these companies? The collection. How is this data being processed by these firms? …

Lawsinindia

5 min read

Protecting Your Digital Identity: Navigating Cybersecurity, Data Privacy, and Laws in India
Protecting Your Digital Identity: Navigating Cybersecurity, Data Privacy, and Laws in India
Lawsinindia

5 min read


Feb 21

RANSOMWARE

And how to be more secure!! Ransomware — — — 100k+ types of ransomware incidents (back in 2013) — — -82% include lateral movement. What do attackers do? — — — — — — — — — — — — — 1) Initial Access → 2) Credential compromisation of a…

2 min read

2 min read

Geeky much!

Geeky much!

87 Followers

Being a smarter security personnel everyday !!

Following
  • Karishma Agrawal

    Karishma Agrawal

  • Ekene Joseph

    Ekene Joseph

  • Jaga_sky

    Jaga_sky

  • Vickie Li

    Vickie Li

  • Jonny Fox

    Jonny Fox

See all (15)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams