Category: CyberSecurity For Intermediate
-

The Security Engineering of Apollo 11’s AGC (Apollo Guidance Computer)
It has been 50 years, since the Mankind’s greatest expedition landed on the Moon…truly astonishing!! History tells that, Humans have always tried to push their limits to reach out to challenging places and that time during 1969, to leave their Homeland – “Earth” to land on the Moon, has to be one of the most…
-

The Headache’s around Application Security (AppSec)
An Overview of Application Security (AppSec) challenges.
-

The Headaches around Application Security (AppSec)
An Overview of Application Security (AppSec) challenges.
-

Container Security Overview
Introduction… Container technology has picked-up in the market with major players viz., Docker, Rkt, LXC etc. This technology resolves quite a few critical Business challenges, by speeding up the time to market of the Software applications and it’s Operations. The Legacy businesses who still use old school Software Development methodologies, would need to adapt to…
-
An Overview of Identity And Access Management (IAM) and it’s Basic hygiene
What’s an IAM? In Security solutions, there is no silver bullet to defend critical assets i.e., there needs to be a layered defence to keep the adversaries at bay. One of the defence mechanisms that an organisation needs to include in its front door arsenal is the, Identity & Access Management (IAM) solution. IAM is…
-
Cyber Threat intelligence (CTI) Data models overview
CTI has been a topic of discussion in the past few years, we heard about various threat actors influencing national elections, taking down power grids, stealing Intellectual property rights, credit card data theft etc. So there has been an urge to share threat intelligence and follow adversaries in real time to counter them. When it…