SD Editor
Advanced Persistent Threats – Part 3
This blog is in continuation to the the part 1 blog. Characteristics of an Advanced Persistent Threat APTs are in […]
What is cyber security?
With the arrival of every new year, follows the arrival of new challenges in the cyberspace for cybersecurity against cybercrime. […]
Advanced Persistent Threats – Part 2
This blog is in continuation to the the part 1 blog. APT attacks are only interested in two things : […]
Advanced Persistent Threats – Part 1
Introduction to cyber threats Cyber threat has been a life long issue facing computer users, be it an individual, organization, […]
Cyber Security Jobs
There are computer programming enthusiasts who don’t sometimes think of a career crime in cyberspace – and why shouldn’t they? […]
Cyber Response Plan for Cyber Security – Need of the Hour – 3/3
We went through the whole CRP life cycle splitting it up into stages to better understand the steps taken in […]
Maze Ransomware Attack on a leading MNC
Cognizant Technology Solutions was hit by a ransomware attack known as Maze. This attack unfortunately comes on top of the […]
NIST Risk management framework in cyber security
NIST provides a risk management framework that can be utilized in the cyber security. The framework contains six steps, starting […]
The world of digital forensics – 2/2
The order volatility is basically listing the order of steps to be performed, like what do you go to first, […]
Juice Jacking – A new cyber threat!
Juice jacking is a new type of cyber-attack that compromise the data found on mobile phones when they are being […]