Stay Connected

My Two Cents on Cyber Security

S1.0-Introducing Google Workspace DLP (Google Drive)

S1.0-Introducing Google Workspace DLP (Google Drive)

Google Drive Data Loss Prevention (DLP) is a feature that helps organizations protect their sensitive data in Google Drive. DLP is a set of tools...

Get Started with Data Loss Prevention (DLP)

Get Started with Data Loss Prevention (DLP)

Data Loss Prevention (DLP) is a technology that prevents sensitive or confidential information from leaking outside of an organization.  DLP solutions typically work by identifying...

Know about Cyber Kill Chain !!!

Know about Cyber Kill Chain !!!

The Cyber Kill Chain refers to the steps that attackers take to infiltrate the system and exfiltrate the data. The cyber kill chain, derived from...

MVT: Mobile Verification Toolkit A toolkit tells if NSO’s PEGASUS spyware targeted your phone

MVT: Mobile Verification Toolkit A toolkit tells if NSO’s PEGASUS spyware targeted your phone

What is PEGASUS

Many of us are aware of the exponential rise in cyberattacks over the past few  years. In the field of cyber attack, the...

JUICE JACKING: Public USB Charging Stations Pose A Risk

JUICE JACKING: Public USB Charging Stations Pose A Risk

Assume you’re going on vacation and intend to take a lot of photos to share on social media, but you just realized your phone’s battery...

Learn to use Security Jargon

Learn to use Security Jargon

This post will serve as a quick reference guide to some of the most widely used jargon in the domain of cyber security.

What’s...
Concept of CIA Triad – First Step to Cyber Security

Concept of CIA Triad – First Step to Cyber Security

We’re going to talk about the CIA today. This CIA has no contact with the Central Intelligence Agency. This CIA is a widely used information...

×