Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
Cyber Security Awareness 2.0

Uday Mittal September 21, 2015 2 Comments

Cyber Security Awareness 2.0

When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]

Filed Under: Awareness Tagged With: awareness, Cyber Security, facebook, Social Media, twitter, youtube

Social Media: Better Be Safe Than Sorry

Uday Mittal June 24, 2015 Leave a Comment

Social Media: Better Be Safe Than Sorry

I still remember the time when I first learnt about the concept of Social Media. It was through Orkut (R.I.P.), the not so successful attempt of Google Inc. to enter into this market. Even though in the larger scheme of things it didn’t fare well but at the time it was the rage. With time […]

Filed Under: Awareness Tagged With: Self-worth, Social Media

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Media user enumeration Wifi

Top Posts

  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress