Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Yaksas CSC Bitcoin

Will Bitcoin Rule The Free World?

Book Review: Practical Threat Intelligence and Data-Driven Threat Hunting

Career in Cyber Security

Cyber Security Education & Career

Cyber Resilient SMEs

Uday Mittal August 20, 2015 Leave a Comment

Cyber Resilient SMEs

Have you ever heard or read about an information security breach in Small or Medium Sized Enterprises (SMEs)? Probably not. Does this mean they are immune to breaches? Definitely not. In fact, SMEs are the most attractive targets for cyber criminals. They are considered to be low hanging fruits. Primarily because they leave their doors unlocked thinking that […]

Filed Under: Awareness Tagged With: Cyber resilient, SMEs

6 Tips for MDM Solution Evaluators

Uday Mittal August 19, 2015 Leave a Comment

6 Tips for MDM Solution Evaluators

A while ago, I did a project for one of the Big 4 in Indian telecom industry. The project was to select and implement a Mobile Device Management (MDM) solution for the organization. During the project, I evaluated most of the market leading products. Given that it’s a nascent niche, the products are evolving fast […]

Filed Under: Mobile Device Management Tagged With: MDM, Mobile Device Management, mobile devices

CISA: Everything You Need to Know

Uday Mittal August 17, 2015 Leave a Comment

CISA: Everything You Need to Know

The second round of CISA examination is around the corner and from my personal experience I know that this is the time when aspirants are on the hunt for good material and tips. Given the value that CISA Certification holds, I would like to share my experience (as much as I can without violating the […]

Filed Under: Essential Certifications, Skills Development Tagged With: CISA, CISA Review Manual, ISACA, Peter Gregory

The Cybersecurity Canon Project

Uday Mittal August 15, 2015 Leave a Comment

The Cybersecurity Canon Project

One thing any Cyber Security Professional crave is good literature on the subject. While there are many books that cover the basics and introduce the reader to the field, there are few which have the potential to spark a debate. My search for such books led me to Cybersecurity Canon list. Cybersecurity Canon Project was […]

Filed Under: Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, palo alto networks, Rick Howard

Build Your Career in Cyber Security

Uday Mittal August 14, 2015 2 Comments

Build Your Career in Cyber Security

A question I get asked a lot these days is, how did I get into the field of Cyber Security? Ever since I started using computers, I’ve been fascinated and thrilled by this field. I started hacking (in it’s true sense) at an early age of 14. The first time I tried to install Linux, I accidentally […]

Filed Under: Higher Education, Skills Development Tagged With: Colleges, Cyber Security, Graduate Courses, M. Tech Information Security

CRISC: Everything You Need to Know

Neha Chandra August 12, 2015 2 Comments

CRISC: Everything You Need to Know

Certified in Risk and Information Systems Control (CRISC) is a fairly new certification exam issued by ISACA. CRISC certified professionals manage organizational risks, associated controls and ensure risk management strategies are aligned to overall business objectives. I appeared for the exam in June 2014 and was amongst the top scorers in Asia region. Since there […]

Filed Under: Upcoming Certifications Tagged With: CRISC, Information Security, ISACA, Risk Management

Windows 10: Tame the Beast

Uday Mittal August 7, 2015 Leave a Comment

Windows 10: Tame the Beast

  With more than 14 million downloads, in less than 24 hours since it’s launch, Microsoft Windows 10 is being considered the best-ever Windows product. Why shouldn’t it be, it’s free after all (for those who hold genuine Windows 7 or 8 license). An year of free Windows is a commendable initiative by Microsoft to ensure […]

Filed Under: Under the Hood Tagged With: Cortana, Microsoft, privacy, Windows 10

Are you the Person of Interest?

Uday Mittal August 6, 2015 Leave a Comment

Are you the Person of Interest?

Imagine the Big Brother from George Orwell’s 1984, only in stealth mode. A system so sophisticated that nothing hides from it. It’s eyes and ears are everywhere. It knows where you are, why you’re there, who you are meeting with and what you are talking about. It watches you every minute of every day. Yet […]

Filed Under: Recommended TV Shows Tagged With: Harold Finch, Person of Interest, Root, the Machine

DCPP: Everything You Need to Know

Uday Mittal July 16, 2015 9 Comments

DCPP: Everything You Need to Know

Last week I gave the DSCI Certified Privacy Professional (DCPP) exam and got my result few days back. Somehow I cleared the exam. Phew! Data Security Council of India (DSCI), is a NASSCOM initiative “To develop capabilities, capacities and norms, in collaboration with all the stakeholders including the government, required to advance towards a safer, […]

Filed Under: Upcoming Certifications Tagged With: Certification, DCPP, DSCI, NASSCOM, privacy

Information Classification: Incentivise, Hammer & Automate

Uday Mittal July 2, 2015 Leave a Comment

Information Classification: Incentivise, Hammer & Automate

“One can only protect something, if they know what is it they need to protect, where is it, who is accessing it and how, how is it being used and to what level should they protect it”.  The above principle holds true, more than anything, for Information Security professionals. Primarily, because to secure any information […]

Filed Under: Under the Hood Tagged With: hammer & automate, incentivise, Information Classification

  • « Previous Page
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • Next Page »

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • AD Exploitation using ADSI - Part 1 (Introduction)
    AD Exploitation using ADSI - Part 1 (Introduction)
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress