Recently, I came across a question on Quora wherein a gentleman, claiming to be 80 years of age, had asked for some advice on how to learn server side languages. In fact, he aimed to beat Mark Zuckerberg and Jack Dorsy before he departs for good. Frankly, I was a bit surprised by this because I […]
The Library Freedom Project
The other day I was researching a topic which was somewhat controversial in nature. My search for more information took me to the local library. I asked the librarian about the section where I could find books on that topic. First he gave me a suspicious look and then directed me towards a computer through […]
Let there be no more MMS Scandals
MMS. What was the first thing that came to your mind after reading MMS? More often than not it’s sex scandals. Like Google has become a synonymous for search, MMS has become a synonymous for unauthorized capture and/or release of a video clip containing intimate acts, usually sexual in nature, aka Sex Scandals. It’s not only illegal, […]
CSX Fundamentals: Everything You Need to Know
Last year, ISACA launched a new series of certifications, focused on Cyber Security, called CyberSecurity Nexus (CSX) Certifications. This series contains a total of eight certifications leading to either CSX Expert or CISM. Image Source: Isaca.org CSX Fundamentals is the first certification in this series. I started my certification path with it and would like to […]
Cyber Resilient SMEs
Have you ever heard or read about an information security breach in Small or Medium Sized Enterprises (SMEs)? Probably not. Does this mean they are immune to breaches? Definitely not. In fact, SMEs are the most attractive targets for cyber criminals. They are considered to be low hanging fruits. Primarily because they leave their doors unlocked thinking that […]
6 Tips for MDM Solution Evaluators
A while ago, I did a project for one of the Big 4 in Indian telecom industry. The project was to select and implement a Mobile Device Management (MDM) solution for the organization. During the project, I evaluated most of the market leading products. Given that it’s a nascent niche, the products are evolving fast […]
CISA: Everything You Need to Know
The second round of CISA examination is around the corner and from my personal experience I know that this is the time when aspirants are on the hunt for good material and tips. Given the value that CISA Certification holds, I would like to share my experience (as much as I can without violating the […]
The Cybersecurity Canon Project
One thing any Cyber Security Professional crave is good literature on the subject. While there are many books that cover the basics and introduce the reader to the field, there are few which have the potential to spark a debate. My search for such books led me to Cybersecurity Canon list. Cybersecurity Canon Project was […]
Build Your Career in Cyber Security
A question I get asked a lot these days is, how did I get into the field of Cyber Security? Ever since I started using computers, I’ve been fascinated and thrilled by this field. I started hacking (in it’s true sense) at an early age of 14. The first time I tried to install Linux, I accidentally […]
Windows 10: Tame the Beast
With more than 14 million downloads, in less than 24 hours since it’s launch, Microsoft Windows 10 is being considered the best-ever Windows product. Why shouldn’t it be, it’s free after all (for those who hold genuine Windows 7 or 8 license). An year of free Windows is a commendable initiative by Microsoft to ensure […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- Next Page »