
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If you are surfing any website...
If you are sending an email...
If you are watching a movie on Netflix...
If you are making an Skype call or Zoom meeting...

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
WHAT IS A DDOS ATTACK?
A DoS Attack (Denial Of Service) is basically a malicious attempted made by threat-actors to attack the 'Availability' of a targeted system, to its legitimate end-users. These targeted systems can be a website or a web-based application. In this attacks, hackers typically generate a large volume of data-packets or requests with the intention of overwhelming the targeted system.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Suppose you visit to a shopping mall, and select a few fashion accessories...
Suppose you visit an Online Shopping Portal, e.g., eBay, Amazon and select a few new cloths for your wardrobe....

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
In the recent years, we have seen an huge rise of mobile endpoints like smartphones, laptops and tablets, as a large number of employees are connecting to corporate networks from a wide variety of places and devices. Today due to Covid-19, the work from home model has become very popular. But this multitude of mobile devices is causing a lot of complications for cybersecurity.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is IoT?
It is Internet of Things. It is about things, I mean, devices...

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
SIEM is a great tool that offers you an unmatched capability to collect, store and analyze security information from across all your organisation. It generates and sends alert to IT admins or Security teams about potential attacks. SIEM also allows your IT team to detect and quickly respond to a large number of threats to your systems, data and networks.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The adoption of public cloud deployments has accelerated for most organizations in recent times. In fact, around 40-50% of companies are opting some sort of public cloud services for storing their data.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What Are Digital Signatures?
A digital signature is exactly what it sounds like a modern alternative to signing documents with paper and pen.
Read more: Why are Digital Signatures So Important? How do Digital Signatures Work?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Vulnerability Assessment (VA) is a very simple concept to understand.
It is about identifying 'potential methods' which may be used by attackers to gain unauthorized entry to your network. The intention is also simple that you want to remedy or mitigate the vulnerabilities (once they become known to you), before they are found or exploited by attackers.
Read more: Vulnerability Assessment - How to Approach Vulnerability Assessments RIghtly?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Zero Trust has become one of cybersecurity’s latest buzzwords.
It’s imperative for you to understand what Zero Trust is, as well as what Zero Trust isn’t.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let's revisit the Wi-Fi security one more time.
There are the following types of wireless security protocols…
- What is SD-WAN Security? How can you Manage SD-WAN Security ?
- WHAT IS BIG GAME HUNTING - Insights into Intrusions
- Bluetooth Security - Don't Under-estimate !
- How Can You Configure a WAF? Why Web Application Firewalls are So Important?
- What is DNS Poisoning? How Do Attackers Poison DNS Caches?
- What is Mobile Phishing ? Why is it the Next Battle Ground in Cybersecurity?
- What is Cloud Assets Management? Why is it so Vital for Your Company?
- What Logs You May Want in Your SIEM and What to do with your Logs?
- 8 Steps to Secure Your IT Environment - A Consultant's Perspective
- What is a HONEYPOT? How do they Enhance Your CyberSecurity?