
Security Analytics Using ELK
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the […]
1. Business continuity to get focus over disaster recovery BCM is a process issue related to building the framework to […]
I was recently attending a conference on Business Continuity Management, and happened to attend an enlightening talk given by Mr. […]
The Directorate of Forensic Science laboratory, Government of Maharashtra Mumbai is holding a forensics awareness week from 7th to 11th […]
From NII Consulting NII Consulting is glad to announce its fourth hands-on workshop for EC-Council’s “Certified Hacking Forensic Investigator (CHFI)” […]
by Kush Wadhwa, NII Consulting Are you working as a cyber crime investigator and looking for something which can prove […]
by Kush Wadhwa, NII Consulting There are times when you don’t have sufficient tools to understand the file system. At […]
by Kush Wadhwa, NII Consulting Have you ever thought of what happens when you hit the delete button? Delete: When […]
By, K K Mookhey At long last there is news that changes will definitely be made to the Indian IT […]