TechGyan

ToolGyan

Matriux Vibhag

CodeGyan

LegalGyan

GRC Gyan

Mom’s Guide

Effective Log Analysis Read more

Log analysis is a responsibility that a secu-rity Analyst need fulfill with at most conviction in all organizations. If our is equipped with security devices like firewall, AV,VPN  which is...

Watering Hole Attacks Read more

In recent months, many readers became familiar with the term “Watering Hole,” used to describe an attack implemented to infect a website’s visitors. One could describe it as a “drive-by”...

WordPress Security Read more

WordPress Security

Introduction You must have heard the name WordPress as it has become popular term across the social media world. I am not going deep into explaining what WordPress is but...