Cyber Security Strategy

Tuesday, 15 June 2021

Risk of Insider Threats

 


at June 15, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Cyber Attack, Infographics, Strategy, Threat Intelligence, Threat Report

GDPR in a Nutshell

 


at June 15, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Privacy, Strategy

Docker Cheat Sheet

 


at June 15, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Cloud Security, Infographics

Saturday, 12 June 2021

Cyber Security Priorities

 


at June 12, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Strategy

How to be Security Conscious

 


at June 12, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Strategy

Categories of Personal Information

 


at June 12, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Privacy

External Digital Footprint

 


at June 12, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Strategy

10 Blind Spots in your Security Posture

 


at June 12, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Strategy

10 Steps to Cyber Security

 


at June 12, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Infographics, Strategy

Sunday, 30 May 2021

End to End Encryption Explained

 


at May 30, 2021
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Encryption, Infographics
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Rajdeep's Profile

Rajdeep has around 17 years of rich experience as a Cyber Security Program Leader working on high visibility programs such as Red Teaming, Advance Penetration Testing, Threat Hunting, Threat Intelligence, Social Engineering, Threat & Vulnerability Mitigation, Malware Analysis, Secure SDLC, Application Security etc. Some of his eminence activities include:

    - Winner of Global Cyberlympics, Middle East and India Regional Championship (a UNO and EC-Council initiative - October 2011); Joint 3rd place winner at Global Cyberlympics finals, held at Virginia, USA
    - Microsoft Most Valuable Professional (MVP) - Consumer Security (2009, 2010, 2011, 2012)

LinkedIn Profile
Malware Analysis Group

Search This Blog

Labels

Infographics Strategy Cyber Attack Ransomware Phishing Privacy Threat Intelligence Threat Report CVE Cloud Security Zero Trust Arificial Intelligence Authentication CISSP Cryptography DevSecOps Encryption Forrester OSINT Tools

Blog Archive

  • ▼  2021 (57)
    • ▼  June (19)
      • Protect Business from Cyber Attacks
      • Cyber ATtack Types
      • Anatomy of a Supply Chain Attack
      • Human Operated Ransomware Attacks
      • Preparedness to Cyber Attacks
      • Biggest Business Risks of 2021
      • State of the SOC
      • Stages of Ransomware Infection
      • Security Transformation
      • Azure Security - Defend across attack chains
      • Risk of Insider Threats
      • GDPR in a Nutshell
      • Docker Cheat Sheet
      • Cyber Security Priorities
      • How to be Security Conscious
      • Categories of Personal Information
      • External Digital Footprint
      • 10 Blind Spots in your Security Posture
      • 10 Steps to Cyber Security
    • ►  May (9)
    • ►  April (15)
    • ►  March (14)
  • ►  2011 (1)
    • ►  April (1)
  • ►  2010 (14)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (7)
    • ►  May (2)
    • ►  April (1)
    • ►  February (1)
  • ►  2009 (4)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
Travel theme. Theme images by A330Pilot. Powered by Blogger.