Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Understand and restrict admin access in your organization

Uday Mittal July 15, 2019 Leave a Comment

Understand and restrict admin access in your organization

In today’s time, providing users with unjustified administrator access on their work systems, could lead to significant business loss. A careless user may download a benign looking file and the next moment you may find yourself battling an organization wide ransomware attack. Here’s a quick guide for small business owners on how to tame this […]

Filed Under: Awareness, Technology Tagged With: administrator access restriction, cybersecurity, Information Security, least privilege, secure access

CISM: Everything You Need to Know

Uday Mittal April 2, 2016 Leave a Comment

CISM: Everything You Need to Know

With 11th June, 2016 approaching fast, I am sure many of our aspiring readers would be looking for information on Certified Information Security Manager (CISM) certification. Wouldn’t it be beneficial, in terms of time and effort, if you could get all your questions answered in one place? Wait! You’re at that place already. Given the […]

Filed Under: Essential Certifications Tagged With: Certification, CISM, Incident Management, Information Security, ISACA, Risk Management

Make Remote Access Your Ally

Uday Mittal March 23, 2016 Leave a Comment

Make Remote Access Your Ally

Today, every organization, big or small, is looking for a way to increase the productivity of their employees. They offer employees various kinds of flexibility options to help them achieve the much sought after work life balance. One such option is providing remote access to corporate network. Through this functionality employees can access their office […]

Filed Under: Technology Tagged With: Authentication, Information Security, Logs, Remote Access

Information Security: Proper Heads for the Hats

Rohan Parakh September 9, 2015 Leave a Comment

Information Security: Proper Heads for the Hats

Last 10 years saw India becoming one of the biggest pool of skilled IT professionals. While this has largely been into IT services sector (software & infrastructure primarily), Indian profiles in world’s biggest product companies is not something unheard of. And while world looks at Social, Mobile, Analytics and Cloud (SMAC) as the next big […]

Filed Under: Skills Development Tagged With: career, Certification, consultants, Information Security, professionals

CRISC: Everything You Need to Know

Neha Chandra August 12, 2015 2 Comments

CRISC: Everything You Need to Know

Certified in Risk and Information Systems Control (CRISC) is a fairly new certification exam issued by ISACA. CRISC certified professionals manage organizational risks, associated controls and ensure risk management strategies are aligned to overall business objectives. I appeared for the exam in June 2014 and was amongst the top scorers in Asia region. Since there […]

Filed Under: Upcoming Certifications Tagged With: CRISC, Information Security, ISACA, Risk Management

CISSP: Everything You Need to Know

Uday Mittal June 28, 2015 1 Comment

CISSP: Everything You Need to Know

I had been waiting for this moment since past few months and it happened yesterday, I passed the CISSP Certification exam in first attempt. Yay! Before I write further, I would like to thank my ex-colleagues and friends who guided me and patiently answered my endless barrage of questions regarding the certification process. Given the value […]

Filed Under: Essential Certifications Tagged With: (ISC)2, Certification, CISSP, Eric Conard, Information Security, Shon Harris

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress