PinnedPut Privacy First : The 7-Point Guide to Privacy By DesignAs we celebrate the Data Privacy Day (28th January 2025), the concerns related to Data Privacy keep on increasing across the globe with…Jan 27Jan 27
PinnedPublished inAWS in Plain EnglishStrengthening Your AWS Security Posture with Security HubThere have been a lot of InfoSec groups/forums where questions around AWS Security Hub are asked. I have observed that the people asking…Nov 4, 2024Nov 4, 2024
PinnedGuarding Your Virtual Fortress : A step-by-step Guide to Install Wazuh on a Virtual Machine | Part…While I was trying to explore more and more things in the defensive security, I thought of learning in detail about SIEM and Wazuh. The…May 27, 20232May 27, 20232
PinnedAll you need to know and do for becoming SOC 2 Type II CompliantWhy do you need a SOC 2 Type II report, what does it mean and how to get it?Jun 15, 2024Jun 15, 2024
PinnedFrom Numbers to Impact: Making Sense of CVSS V4.0 Score with Practical ExamplesIn today’s ever-evolving cybersecurity landscape, prioritising vulnerabilities effectively is critical. The Common Vulnerability Scoring…Feb 25, 20241Feb 25, 20241
RBI’s Master Direction on IT Outsourcing: Ensuring Compliance and Building TrustIt has been more than a year since the Reserve Bank of India (hereafter referred as “RBI”) launched the Master Direction on Outsourcing of…Dec 14, 2024Dec 14, 2024
Divide and Conquer: Shared Security in the CloudIn today’s digital age, cloud computing has become an indispensable tool for businesses of all sizes. The flexibility, scalability, and…Nov 30, 2024Nov 30, 2024
The real meaning of OWASP Top 10 Mobile 2024 list from Security and Privacy ViewpointsRecently, the final list of top 10 mobile application vulnerabilities has been released by OWASP. The last one was released in 2016. The…Feb 10, 2024Feb 10, 2024
A Deep Dive into Zero Trust ArchitectureAny organisation or business becomes successful only if it is trusted by its customers and investors. When it comes to organisations…Nov 5, 2023Nov 5, 2023
Personally Identifiable Information (PII) — Why so important and how to protect it?Recently, the Government of India brought the DPDP (Digital Personal Data Protection) act and since then, I have been reading a lot of…Sep 16, 2023Sep 16, 2023