Vulnerability Assessment
A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system.
Instilling Cyber Resiliency For A Secure Future!
Browsing Tag
A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system.
Security Compliance Audit takes into account various security measures that are either point in time adherence or are to be maintained throughout the audit period.
security aims to protect digital data from attackers, from the unwanted actions of unauthorized users and accidental disclosure such as a cyber attack or a data breach.
This is an ongoing list of information security concepts, definitions and acronyms.
In this post we will go through the major sections of Indian Information Technology Act. Although this is a very high level overview, it will still help you to understand what all are the offense and what punishment can a culprit be sentenced if found guilty.
Although it is very important to train employees on best security practices and procedures, many organizations turn a deaf ear towards it and once they get breached or their compliance is revoked, they understand necessity and significance of security awareness training.
I would like to start with the flicks which amazingly portrayed Social Engineering Tantrums. The whole point behind giving a movie list in the beginning is simple – just to cast a spell of this amazing “Art of Deception”.
Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology.
We are living in an era where technology is in the hands of toddlers, youngsters cannot live without it and the seniors who had not been exposed to internet are putting efforts to tame this digital beast or at least trying to get along with the smartphones & using them to their full potentials.