PinnedPublished inSystem WeaknessDPDP: From Buzzword to Reality: A Long-Term Practical Approach in IndiaThis won 2nd place in ISACA whitepaper contest.Sep 2Sep 2
PinnedEvaluating SAAS contractsInitially cloud was all about IAAS, however assembling hardware and shipping large servers was now a thing of past. It was just few clicks…Dec 2, 20211Dec 2, 20211
Simplifying Private File Uploads in Azure IoTIn the world of Internet of Things (IoT), managing large file uploads from devices can be challenging. Azure IoT Hub offers a robust…1d ago1d ago
Published inSystem WeaknessSnowflake Enhances Security with Leaked Password ProtectionSnowflake, a leading data cloud company, has recently announced the general availability of its Leaked Password Protection (LPP) feature…1d ago1d ago
Published inSystem WeaknessUnderstanding AWS Resource Control Policies (RCPs): A New Layer of SecurityResource Control Policies (RCPs): Enhancing AWS Organizations’ SecurityAWS has introduced a powerful new tool for organizations to…2d ago2d ago
Published inSystem WeaknessHow Non-Human Digital Identities Are Reshaping Cybersecurity in 2024The digital landscape has evolved far beyond human users. Today, our systems are filled with artificial workers — from automated scripts…4d ago4d ago
Published inSystem WeaknessRansomware Protection: Lessons from the PlaybookRansomware attacks have become one of the most pressing cybersecurity threats facing organizations today. In his book “Ransomware…Nov 13Nov 13
Embracing StarlightIn the shadows of night, a mother stands alone, Cradling her child, different yet her own. The world outside may not understand, But in her…Oct 27Oct 27
Best Practices To Protect a SaaS CompanyA leader in the company asked “I am a SAAS (software as a service) company and I want to get a penetration testing done to ensure…Jul 31Jul 31