Home Search

ravi das - search results

If you're not happy with the results, please do another search

Domain Name System Over HTTPS: What’s It All About? (Part 2)

0
As the first article in this series explained, the Domain Name System (DNS) is one of several processes triggered each time you access a...

Domain Name System Over HTTPS: What’s It All About? (Part 1)

0
Whenever we open launch a Web browser (whether it is Firefox, Opera, Safari, Chrome, Edge, etc.) and enter a URL (which is essentially the...

What is the Role of Penetration Testing Teams? (Part 2)

0
As explained in Part 1 of this series the “ethical hacker” teams that conduct Penetration Testing are known as the Blue Team, the Red...

Why Secure Coding is Key for Small Businesses (Part 2)

0
Part 1 of this series introduced the importance of small business (SMB) to make sure that their web-based apps are created and run using...

Artificial Intelligence & Political Campaigns (Part 2)

0
Artificial Intelligence (AI) is increasingly being used in political campaigns to give candidates an edge over the competition. The many advantages of this approach...

Why Secure Coding is Key for Small Businesses (Part 1)

0
Today’s small businesses (SMBs) are launching a plethora of web-based apps not only to make their tools easier for customers to access, but also...

Medical Devices at Risk for Cyberattacks

0
With the Cybersecurity world focused on Phishing, attacks to Critical Infrastructure, and Ransomware, there is one area that is just as vulnerable, perhaps more:...

The Benefits of Developing a Business Continuity Plan

0
In a previous article we defined the role of a Business Continuity (BC) Plan following a security breach. This article will describe the importance...

The Role of Encryption in Protecting Data

0
With the near 99% Remote Workforce now becoming a reality for the long haul, Corporate America has learned some harsh lessons about Cybersecurity during...

Five Famous Cyberattacks Against Critical Infrastructure

0
When one thinks of a Cyberattack, what often comes to mind is the damage done to Web servers and databases. In those kinds of...