Checkmate
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Articles by K K Mookhey

Holiday wishes from the CEO’s Desk!

December 25, 2021 K K Mookhey 0

The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in the number of cases worldwide. [more]

Kick-start your Cybersecurity career in 2022

December 17, 2021 K K Mookhey 0

The new year is always a great time to set new resolutions. And a great resolution is to do things that would help on the professional front. One question that [more]

webinar-cybersecurity-for-remote-workforce-by-kk-mookhey

[Webinar] Cybersecurity for Remote Workforce by KK Mookhey

May 24, 2020 K K Mookhey 0

[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their employees, this brings a wide variety of cybersecurity risks. Recently, [more]

Breach Response – Lessons learnt in the past one year

June 30, 2017 K K Mookhey 3

The past 12-18 months we have seen a lot of activity in the area of breach response. We not only launched our Big Data Security Analytics platform using ELK, began [more]

No Image

Why having a bug bounty program makes sense

December 21, 2016 K K Mookhey 0

Introduction Over the past few years, bug bounties have begun to garner mainstream attention. With over 150 companies offering their own bug bounty programs and hundreds of others working with [more]

No Image

Hardware Security Module (HSM) security testing checklist

August 15, 2016 K K Mookhey 4

One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use it to store your debit card and credit card PINs. [more]

Ultra-short guide to Big Data and Security

July 14, 2016 K K Mookhey 2

If you are looking to navigate your way through the complexities of Big Data and its use in Security, here are some links to get you off the ground: Big [more]

Posts navigation

1 2 3 »

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 122 other subscribers

Top Posts

  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Zero-day vulnerability (aka Log4Shell) in Apache Log4j is being actively exploited
    Zero-day vulnerability (aka Log4Shell) in Apache Log4j is being actively exploited
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
    Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
    Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
    Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Revealing REvil
    Revealing REvil
  • Significance of a career in Security Operations Center  (SOC)
    Significance of a career in Security Operations Center (SOC)
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Breaking up on Valentine’s Day!
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Holiday wishes from the CEO’s Desk!
  • Kickstart your holiday spirit with some cybersecurity binge watching!
  • Make it to Santa’s ‘Nice’ Cybersecurity list!
  • 7 Steps To Protect Your Digital Privacy In This Holiday Season!
Assessment C++ coding cybersecurity Cyber Security Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2022 | WordPress Theme by MH Themes