policies-and-procedures

Learn Different Types of Policies and Procedures in CISSP

2
An organization should define its security plan. Security follows a top-down approach. In other words, the security strategy and scope are discussed, defined, and...
Common Symptoms

Common Symptoms of Cyberattack To Look Out For

Cyberattacks seldom occur with an alert or an alarm and when it happens the damage is found to be irreparable. The frustrating thing is...
risk-analysis

Learn About the Different Types of Risk Analysis in CISSP

0
In the previous article, we talked about the risk assessment process. The output of this process is a list of existing vulnerabilities, associated threats,...
Zero Knowledge Proof- Featured Image

Zero Knowledge Proof : There won’t be any information to hack!

We have been part of a great technological transformation since last few decades. When you’ll look back, you’ll experience a wave of nostalgia as...
Detect Network Vulnerabilities

List of Tools to Detect Network Vulnerabilities

Companies set high budgets to protect their IT assets from cyberattacks and Detect Network Vulnerabilities. However, managers have realized that it is very difficult...
Security Trends

Top Security Trends in IoT For 2017

We cannot discuss technology, IoT (Internet of Things) and the internet, without also discussing security. Whenever we connect to the internet, there is always...
one-time-passwords

Learn about One-Time Passwords in CISSP

Now, let's discuss One-Time Passwords. One-Time Passwords As its name implies, a one-time password (OTP) is a password that is valid only once. This is usually...
IoT Devices

Here’s How You Can Secure Your IoT Devices

Smart devices are taking over our world and invading every corner of our lives. From smartphones to smartwatches, even our kitchen gadgets are turning...
security-governance

Learn about Security Governance in CISSP

0
Security is no longer considered to be some sort of luxury. Today, being adequately secure is vital for companies to survive and stay in...
Spam Detection

Spam Detection using Naive Bayes Algorithm

Every day, we receive tons of irrelevant emails, some of which are simply marketing/promotional emails while others are fraudulent ones. The top tech companies...