Security Analytics Using ELK
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]
by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the registry or set create a […]
1. Business continuity to get focus over disaster recovery BCM is a process issue related to building the framework to increase business resiliency and restoration […]
I was recently attending a conference on Business Continuity Management, and happened to attend an enlightening talk given by Mr. Vijay Sethi, CIO of Hero […]
The Directorate of Forensic Science laboratory, Government of Maharashtra Mumbai is holding a forensics awareness week from 7th to 11th Jan 2008. The Director — […]
From NII Consulting NII Consulting is glad to announce its fourth hands-on workshop for EC-Council’s “Certified Hacking Forensic Investigator (CHFI)” certificate course. As an Accredited […]
by Kush Wadhwa, NII Consulting Are you working as a cyber crime investigator and looking for something which can prove in court of law that […]
by Kush Wadhwa, NII Consulting There are times when you don’t have sufficient tools to understand the file system. At that time your knowledge in […]
by Kush Wadhwa, NII Consulting Have you ever thought of what happens when you hit the delete button? Delete: When we simply delete a file […]
By, K K Mookhey At long last there is news that changes will definitely be made to the Indian IT Act, purportedly due to the […]