Is Cyber Security Setting Itself For Failure By Carrying On Without Women Presence?The Conversation says:Aug 29, 20222Aug 29, 20222
Space Explorations In The Face Of Cyber ThreatsI encountered these mesmerising and glamorous images taken by James Webb Telescope recently. I am sure most of you did too.Jul 19, 20221Jul 19, 20221
Importance of Identity & Access ManagementIdentity and Access Management (IAM) has been a very hot topic in security.Jun 6, 2022Jun 6, 2022
How To Use Project Management Skills In Cyber Security?Cyber Security is not an easy field to comprehend.May 16, 2022May 16, 2022
Cyber Security in Project ManagementProject management is a huge effort from start to end. It requires constant and clear communication, great understanding the goals and…May 9, 2022May 9, 2022
Cyber Security In Product ManagementProduct Management is the process of managing a product throughout its lifecycle.May 2, 2022May 2, 2022
What Is Secure Software Development Life Cycle (SSDLC)?We need to play smart when it comes to software development as it is far beyond coding.Apr 25, 2022Apr 25, 2022
How Hackers Stalk Your KeystrokesYou open your laptop and start surfing on the internet. It is just another regular day.Apr 11, 2022Apr 11, 2022
Power Of IDS & IPS in Cyber SecurityI believe that we should first start asking questions to understand the criticality of Intrusion Detection and Intrusion Protection…Apr 4, 2022Apr 4, 2022
What To Know About Mitre Att&ck?As the technology is evolving and our IT assets are increasing with each passing day, it’s becoming harder and harder to evaluate our…Mar 28, 2022Mar 28, 2022