TechGyan

ToolGyan

Matriux Vibhag

CodeGyan

LegalGyan

GRC Gyan

Mom’s Guide

Network Security Basics Part-2 Read more

This section will demonstrate common information security problems mapped with OSI seven layers and evaluate the same for solutions to secure the organisation’s information resources. Layer 1 – Physical Layer...

Effective Log Analysis Read more

Log analysis is a responsibility that a secu-rity Analyst need fulfill with at most conviction in all organizations. If our is equipped with security devices like firewall, AV,VPN  which is...

Watering Hole Attacks Read more

In recent months, many readers became familiar with the term “Watering Hole,” used to describe an attack implemented to infect a website’s visitors. One could describe it as a “drive-by”...

WordPress Security Read more

WordPress Security

Introduction You must have heard the name WordPress as it has become popular term across the social media world. I am not going deep into explaining what WordPress is but...