Top 5 Best Practices for a Cost-Effective Internal Audit

Introduction What is Internal Auditing? According to the Institute of Internal Auditors (IIA), internal auditing is: “An independent, objective assurance and consulting activity designed to add... Go on to the site to read the full article ... Read More

Threat Hunting for Mismatched Port – Application Traffic

| | Threat Hunting
Indicators of compromise or IOCs are evidence indicating a breach of security. IOC includes virus signature, IP address, Hash value of Malware, Malicious URL and Domains, C2 servers, etc.... Go on to the site to read the full article ... Read More

Threat Hunting for Unexpectedly Patched Systems

| | General Security
Threat hunting is the proactive approach to find anomalies related to threats that could cause potential harm to an organization. These could be the signs of intrusion, as a part of malware campaign,... Go on to the site to read the full article ... Read More

Threat Hunting for File Hashes as an IOC

Threat Hunting is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” This is a proactive... Go on to the site to read the full article ... Read More

5 Ways to Identify a Spear Phishing Email

| | Phishing
Spear phishing is a targeted form of email attack used to steal sensitive information through enticement, impersonation, or access-control bypassing techniques. In a normal phishing attack, the... Go on to the site to read the full article ... Read More

Maintaining Your CGEIT Certification: Renewal Requirements

Introduction The CGEIT certification is offered by the Information System Audit and Control Association (ISACA). It is based on the framework for governing enterprise IT with focused areas including... Go on to the site to read the full article ... Read More
Computer Forensics: Online Gaming and VR Forensics

Computer Forensics: Online Gaming and VR Forensics

Introduction With the expansion of technology, such as virtual reality simulators, it’s only natural that with progress comes setbacks, especially when it comes to security breaches. With the VR... Go on to the site to read the full article ... Read More
Top Cyber Security Challenges in Smart Cities

Top Cyber Security Challenges in Smart Cities

In the recent past, the idea of smart cities was only conceptualized in sci-fi movies and books of fiction. Today, however, that idea is rapidly transitioning from imaginative realms into realities.... Go on to the site to read the full article ... Read More

Secure Guardrails