Stalkerware – Is Somebody Watching You?
Trigger Warning – Abuse, Stalking, Death She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why […]
Trigger Warning – Abuse, Stalking, Death She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why […]
Clubhouse and its exponential growth during COVID-19 Clubhouse is an invite-only audio-chat iPhone app founded by Paul Davison and Rohan Seth. It allows users to […]
ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible for processing incoming data. It […]
Penetration Testing as per PCI DSS version 3.2 As per PCI DSS v3.2, Requirement 11.3 addresses penetration testing activity for organizations following PCI DSS compliance. […]
Vendor Patches: Google Releases Security Update for Chrome Cisco Releases Security Update Oracle Releases Security Bulletin Apple Releases Multiple Security Updates Drupal Releases Security Advisory […]
From Our Blog: Data Privacy – An Introduction by Latha Sunderkrishnan (Senior Consultant) When companies and merchants use data or information that is provided or […]
Starting out with enterprises equating information security with just having an antivirus, or a firewall, to cutting edge technologies are being adopted in security today – […]
Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating officially as: “to provide legal […]
The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The […]
When we heard Khushbu Pratap’s name cropping up in Gartner’s explanation on its Magic Quadrants, we thought we would ask her about how her experience working at NII […]