Security Best Practices

Deception Technology: The Art of Recording Cyber Attacks

Introduction To Deception technology:  Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets…

3 years ago

Zero Trust Maturity Model

What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the…

3 years ago

Misconfigured Cross-Origin Resource Sharing (CORS) Risk

The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between…

3 years ago

Threat Modelling – Focused Defence for Modern Enterprises

Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul…

3 years ago

Zooming Security Vulnerabilities [Part – 2]

This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!  …

4 years ago

Zooming Security Vulnerabilities [Part – 1]

Diving into Zoom Security Vulnerabilities [Part – 1]   Introduction - Zoom is a popular web-based video-conferencing application available to…

4 years ago

Organizations Hit by Maze Ransomware Attack !!

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…

4 years ago

Containerization and It’s Impact on Enterprise Security

What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about…

5 years ago

Joanap and Brambul Malware

Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last…

5 years ago

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…

5 years ago