CALL US

+91 9116117170

Category: Cyber Security Terminology

Cybersecurity Tools: How Much Is Fun?

By Shouvik Dutta 0 Comment March 16, 2020

Using too many cybersecurity tools can possibly reduce your organization’s security. A valid argument when we are using too many tools is that some tools may interfere with the rest of the tools. Antivirus package has been a classic example of this idea. If there is more than one antivirus in the same system then […]

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

Risk Assessment Process - Cyberops

Information Security: Risk Assessment & Treatment

By Annu Choudhari 0 Comment September 7, 2019

Risk assessment (often called risk analysis) is perhaps the most difficult part of implementing ISO 27001, but at the same time, risk assessment (and its processing) is the most important step at the beginning of your information security project – it establishes the basis for information security in your company. The question is – why […]

AI in Cyber Security

Role of AI in Cyber Security

By Mohammed Tahir 0 Comment August 1, 2019

Artificial Intelligence  The technology of computer system is able to accomplish tasks usually need of human intelligence, such as visual perception, acknowledgment, decision-making, and translation between languages or in other words artificial decision-making similar to the human for the same, based on certain unique algorithms and related mathematical calculations known as Artificial Intelligence (AI). Cyber […]

Security in web development

By Annu Choudhari 0 Comment July 16, 2019

The essential guide to secure web development Developing secure and reliable cloud-based web applications is very, very difficult. If you think otherwise, you are either not of this world, or your life has not yet taught you a lesson.  If you have already become infected with the idea of ​​a “minimum viable product”. And consider […]

error: Content is protected by Cyberops !!