Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
DCPP: Everything You Need to Know

Uday Mittal July 16, 2015 9 Comments

DCPP: Everything You Need to Know

Last week I gave the DSCI Certified Privacy Professional (DCPP) exam and got my result few days back. Somehow I cleared the exam. Phew! Data Security Council of India (DSCI), is a NASSCOM initiative “To develop capabilities, capacities and norms, in collaboration with all the stakeholders including the government, required to advance towards a safer, […]

Filed Under: Upcoming Certifications Tagged With: Certification, DCPP, DSCI, NASSCOM, privacy

Information Classification: Incentivise, Hammer & Automate

Uday Mittal July 2, 2015 Leave a Comment

Information Classification: Incentivise, Hammer & Automate

“One can only protect something, if they know what is it they need to protect, where is it, who is accessing it and how, how is it being used and to what level should they protect it”.  The above principle holds true, more than anything, for Information Security professionals. Primarily, because to secure any information […]

Filed Under: Under the Hood Tagged With: hammer & automate, incentivise, Information Classification

Will Bitcoin Rule The Free World?

Uday Mittal June 29, 2015 Leave a Comment

Will Bitcoin Rule The Free World?

Every once in a while, a new idea is born—one that has the potential to question the very foundations of everything we know about the world as it is today. The ideas I am talking about are those that have changed and will change the world for the better. Take email, for example—at its inception, […]

Filed Under: Under the Hood Tagged With: Bitcoin, bitcoin mining, crypto-currency, Satoshi Nakamoto

CISSP: Everything You Need to Know

Uday Mittal June 28, 2015 1 Comment

CISSP: Everything You Need to Know

I had been waiting for this moment since past few months and it happened yesterday, I passed the CISSP Certification exam in first attempt. Yay! Before I write further, I would like to thank my ex-colleagues and friends who guided me and patiently answered my endless barrage of questions regarding the certification process. Given the value […]

Filed Under: Essential Certifications Tagged With: (ISC)2, Certification, CISSP, Eric Conard, Information Security, Shon Harris

Good Read: The Snowden Files

Uday Mittal June 26, 2015 Leave a Comment

Good Read: The Snowden Files

When I first heard about the PRISM mass surveillance program, conducted by the United States National Security Agency (NSA), I thought it was an hoax. Primarily, because up until then that kind of stuff belonged to Hollywood movies only, at least for the uninformed me. But as the news snowballed and caught the attention of […]

Filed Under: Good Reads, Non-Fiction Tagged With: Edward Snowden, Luke Harding, Mass Surveillance, The Snowden Files

A Movie on Privacy: Enemy of the State (1998)

Uday Mittal June 25, 2015 Leave a Comment

A Movie on Privacy: Enemy of the State (1998)

Recently, I read an article about how government surveillance has evolved over the years and how the adoption of new technologies and services is aiding it. An interesting point to note was the striking similarity between the government’s version and the ‘tracking‘ done by the private firms for ‘analytical purposes‘ to ‘improve their services‘. While […]

Filed Under: Recommended Motion Pictures Tagged With: Enemy of the state, privacy

Social Media: Better Be Safe Than Sorry

Uday Mittal June 24, 2015 Leave a Comment

Social Media: Better Be Safe Than Sorry

I still remember the time when I first learnt about the concept of Social Media. It was through Orkut (R.I.P.), the not so successful attempt of Google Inc. to enter into this market. Even though in the larger scheme of things it didn’t fare well but at the time it was the rage. With time […]

Filed Under: Awareness Tagged With: Self-worth, Social Media

Uday Mittal June 23, 2015 1 Comment

Secure Your Wifi Connection: Why & How?

If you’ve been on the internet for a while you would have come across one of those Memes highlighting the importance Wifi in our lives. If not do a quick Google search, get a cup of coffee and have a blast! Thanks to our 24 x 7 companions, smartphones, tablets and laptops, Wifi has almost […]

Filed Under: Awareness

  • « Previous Page
  • 1
  • …
  • 6
  • 7
  • 8

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress