More Posts
Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
October 3, 2022
0
One question that I frequently get asked is how should one go about building a career in cybersecurity? Having hired and overseen the careers of thousands of cybersecurity professionals at [more]
The weaponisation of information
September 27, 2022
0
This is one win India isn’t proud of. In July, our country earned the dubious distinction of being the top source of misinformation spread during the Covid-19 pandemic. Think about [more]
In a commoditised world, where is individual privacy?
September 19, 2022
0
The Indian government’s guidelines for virtual private network (VPN) providers came into force on 25 September, 2022. They mandate, among other things, storing users’ personal data for up to five [more]
Look who’s watching
September 12, 2022
0
In 2021, Delhi Chief Minister Arvind Kejriwal spoke about the city beating Shanghai, New York, and London with the most number of closed-circuit TV cameras per square mile. The updated [more]
National Information Assurance (NIA) Policy V2.0 –Qatar
June 22, 2022
0
Qatar is one of the wealthiest countries in the world. As cyber threats worldwide proliferate, shielding Qatar’s critical ICT infrastructure and systems has become a top priority for the Ministry [more]
DFIR
-
T’is The Season To Beware Of Online Scammers, Fa-la-la-la-la, la-la-la-la!
December 13, 2021 0 -
Windows Timeline: Putting the what & when together
October 5, 2021 0 -
July 30, 2021 0
-
Technical Analysis of DearCry Ransomware
April 1, 2021 0 -
DearCry Makes Organisations Cry
April 1, 2021 0
Assessment
-
SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
December 31, 2020 0 -
SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
December 11, 2020 2 -
Security Assessment of the IBM i (AS 400) System
August 9, 2020 1
Uncategorized
-
August 26, 2021 0
-
The Ominous signs of a potential Inter-State Cyberwar
August 16, 2021 0 -
Stalkerware – Is Somebody Watching You?
April 9, 2021 0 -
Vulnerabilities and Privacy Issues with Clubhouse App
March 12, 2021 0 -
How to Evaluate the ROI on Your Cyber Security Investments?
January 29, 2021 0 -
Active Subdomain Enumeration (Part 2)
October 27, 2020 0 -
Passive Subdomain Enumeration (Part 1)
September 24, 2020 4