top of page
Kiruthika Nagarajan
Jul 18, 20221 min read
Basics of ISO 27001
Information security is key and base foundation to an organization which typically explains the working functionalities of organizations...
124 views0 comments
Harisuthan
Jul 15, 20221 min read
Threat Hunting Loop
Threat Hunting is basically defined as a hypothesis-based proactive detection of malicious activity, where we replicate or build an...
116 views0 comments
SATHISH R
Jul 10, 20222 min read
Cloud Service Models
The Cloud providers categorize their services. The most common service category are, Infrastructure as a Service (IaaS). Platform as a...
36 views0 comments
Kiruthika Nagarajan
Jul 7, 20223 min read
Information Security Frameworks
What is Information Security Framework? The development of an Information security framework offers corporate and government security...
328 views1 comment
Harisuthan
Jun 30, 20221 min read
Zerologon Vulnerability | CVE-2020-1472
A security flaw in a Netlogon authentication protocol validates the authentication on domain-based networks. NETLOGON PROTOCOL The...
114 views0 comments
Harisuthan
Jun 23, 20221 min read
Working Of Threat Hunting
Team threat hunters are front-line defenders who proactively detect malicious or suspicious activity by investigating internal systems in...
159 views0 comments
Harisuthan
Jun 10, 20222 min read
Pyramid of pain
Pyramid of pain is a threat hunting cookbook used by the threat hunters to investigate or determine cyber threats, it's a combination of...
199 views0 comments
Harisuthan
Jun 6, 20221 min read
Basic Of Cyber Threat Hunting
In recent trends, many adversaries remain hidden in an organization for a month before detection it has been too challenging for many...
144 views0 comments
Keerthana Partheeban
May 29, 20222 min read
Cyber Threat Intelligence
Organizations face a lot of threats in their day-to-day basics. Cyber threat intelligence is the evidence-based knowledge about existing...
92 views0 comments
Harisuthan
May 26, 20222 min read
Gopalsamy Rajendran | Senior Security Engineer
Gopalsamy Rajendran is a passionate Cyber Security Researcher, he identifies himself as an OWASP Cuddalore Chapter Leader and founder and cr
151 views3 comments
Harisuthan
May 24, 20221 min read
Types Of Intrusion
In-general intrusion is an process/technique to penetrates into an system/organization by exploiting the vulnerabilities, this specific...
172 views0 comments
Harisuthan
May 21, 20221 min read
The Authentication
A process of validating a legit user by validating with a unique identity, Authentication provides restrictions over physical and logical as
42 views0 comments
Harisuthan
May 19, 20221 min read
Arunkumar R | Application & Network security engineer
Arunkumar R is a passionated Cyber Security Researcher, he identifies himself as a founder and creator of the YouTube channel called Arunkum
210 views0 comments
Harisuthan
May 17, 20221 min read
Foundation of information security
Information security are key and base foundation to an organization which typically explains working functionalities of an organizations [ru
54 views0 comments
SATHISH R
May 15, 20221 min read
Types Of Cloud Deployment
The tremendous growth on cloud technology leads to an massive updating and classification, In-general cloud deployment are classified...
44 views0 comments
Harisuthan
May 14, 20221 min read
Access Control
The process or an technique to implement restriction or adding addition form of security to prevent un-authorized user from both physical...
66 views0 comments
Harisuthan
May 12, 20221 min read
CIA Triad
A fundamental law which clearly explain how the information assets need to be secured, It broadly classified into three major types...
41 views0 comments
SATHISH R
May 10, 20222 min read
Basic of Cloud Computing
Cloud computing is the practice of using remote servers hosted on the internet to store, manage, and process data rather than a local server
104 views1 comment
Keerthana Partheeban
May 9, 20224 min read
Roles in Cyber Security
Cyber security or Information security is the practice of protecting the assets, networks, and data from threats. It can be either in cybers
296 views5 comments
Harisuthan
May 8, 20221 min read
Basic of Information security ?
The process or an technique to protect/safeguard any form of informational assets such as Excel sheet, word documents even an printed paper
92 views0 comments
bottom of page