
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You may laugh, but Vulnerability Assessment Analysts are actually cybersecurity trouble-seekers.
They scan applications, systems and networks all the time, looking for vulnerabilities and deviations from acceptable configurations, enclave policy or local policy. They then present their findings in a comprehensive list or report (the vulnerability assessment) so that their clients can use it to improve their security posture.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Recently I had shared a number of posts on Blockchain technology.
Yes, I am aware of some basic benefits of Blockchain. For example,
Blockchain works as a shared system of record among participants on a business network, eliminating the need to reconcile disparate ledgers. It is distributed!

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The principle of least privilege is widely considered to be a cybersecurity best practice and is a fundamental step in protecting privileged access to high-value data and assets.
The principle of least privilege (PoLP) is an information security concept in which a user is given the minimum levels of access – or permissions which are needed to perform his/her job functions.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Secure Boot is one feature of the latest Unified Extensible Firmware Interface (UEFI) 2.3.1 specification (Errata C). The feature defines an entirely new interface between operating system and firmware/BIOS.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
NOTE:
Guys, this is a top-quality reference material and you can grasp a number of valuable ideas to learn more about your cybersecurity efforts. Kindly spend a little time to understand it.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Red Teaming is a full-scope, multi-layered attack simulation designed to measure how well a company’s people and networks, applications and physical security controls can withstand an attack from a real-life adversary.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A digital certificate is a small computer file. It is used to establish a relation between both the user and his or her public key. A digital certificate contains two things i.e. the name of the user and the his or her public key. So that we can identify that the particular key belongs to the particular user.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Many organizations must comply with a mixture of state-mandated, industry-specific, and international cybersecurity regulations. The challenge for an organization which is trading nationally, or even globally, is considerable.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
An APT is a broad term typically used to describe a stealthy threat-actor, that has gained unauthorized access to network. The motivation is to mine highly sensitive data or intellectual property, data that the cybercriminal can ultimately sell or monetise. These are the step a threat actor would undertake:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If a major incident does occur, what are the immediate steps you should take to respond?
Let's consider something which every executive in IT fears.
If you have already work in cybersecurity then you would know it perfectly.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
We all know what is Penetration Testing. Right?
In this post, I am trying to present you an holistic view of real-life IT penetration testing.
- What is the Difference between IT and OT? Why OT Security is Important?
- How Do Cyber Attackers Gather Information Before Targeted Attacks?
- In-Demand CyberSecurity Jobs 2021
- Why Do Your Business Need Disaster Recovery Plan? 6-Steps to Create a DRP
- Top-11 Cloud Security Threats
- What is LDAP? What can you do to Enhance LDAP Security?
- What are Targeted Attacks? How are they Different from Traditional Online Threats?
- What is Containerization? What is its Secret?
- 3-Security Testing Approaches to Risk Assessment.
- What is MIME (Multipurpose Internet Mail Extensions)? What all you need to know about it?