Browsing category

CYBER SECURITY

Understanding Diamond Model Of Intrusion Analysis

  The Diamond Model of Intrusion Analysis is made up of four parts, as shown in the figure. The model represents a security incident or event. In the Diamond Model, an event is a time-bound activity that is restricted to a specific step in which an adversary uses a capability over infrastructure to attack a […]

How To Establish Incident Response Capability

  Incident Response involves the methods, policies, and procedures that are used by an organization to respond to a cyber attack. The aims of incident response are to limit the impact of the attack, assess the damage caused, and implement recovery procedures. Because of the potential large-scale loss of property and revenue that can be […]

8 Expert Tips To Clear CEH Exam In First Attempt

  With the Covid 19 pandemic ravaging the country, more and more businesses have had to shift online. While many businesses struggle to get their feet off the ground in the online sphere, organizations that help in IT training and obtaining ethical hacker certification have been around the block.   Whether you are getting your […]

The Ultimate Online Privacy Guide for Journalists

  As a journalist in 2021, the dangers you face are ever-increasing. Without the proper protection from online threats, you risk hackers stealing confidential information, exposing your sources, breaking anonymity, and getting hold of your unpublished stories. You’d be a prime victim for blackmail — or worse.   Some of these dangers can even be […]