CIS Controls for your OrganzationCIS controls, or Cеntеr for Intеrnеt Sеcurity Controls, are a set of best practices designated to help organizations enhance their cyber…Jan 2Jan 2
Security Issues in Artificial IntelligenceArtificial intelligence has been evolving at a fast pace and being used in numerous ways, from Google’s assistant to medical wearables. AI…Mar 29, 2021Mar 29, 2021
HoneypotsThere are two primary types of honeypot designs: production and research. Production honeypots mainly serve as decoy systems inside a…Mar 29, 2021Mar 29, 2021
Detecti of Phishing WebsitesSocial engineering attacks are used to reveal private and confidential information by simply tricking the users without being detected…Mar 13, 2021Mar 13, 2021
Cache andWeb caching has been employed to improve the efficiency and reliability of data delivery over the Internet. It is the activity of storing…Mar 12, 2021Mar 12, 2021
Network Access ControlOrganizations face threats while providing network access to customers, vendors, mobile employees, contractors, and others. These inside…Mar 10, 2021Mar 10, 2021
GOBBLES exploit and SSHThe GOBBLES exploit uses the SSH client that is modified to request “keyboard-interactive” authentication from the server. This causes the…Mar 10, 2021Mar 10, 2021
Security as a ServiceWhile common security solutions are based on location and hardening of vulnerabilities by doing proper security mechanisms to meet…Nov 16, 2020Nov 16, 2020
Data recovery and business continuity in cloud computingCloud computing has become an attractive business strategy in the information technology sector. Small and medium business organizations…Nov 16, 2020Nov 16, 2020
Application Security IssuesCloud computing allows for on-demand network access to shared configurable computing resources that be provisioned and released with…Nov 16, 2020Nov 16, 2020