This article looks into exploit development and vulnerability research
read moreIntegrating cybersecurity with business continuity
This article looks into integrating BCP with Cybersecurity
read moreCybersecurity Metrics and KPIs for Effective Management
This article looks into cyber security metrics and KPI
read moreThe Day the Network Cracked: A Red Teamer's Tale of Tactics and Triumph
This article looks into red teaming cyber operations
read moreThe Mergers and Acquisitions Tightrope Walk: Why Cybersecurity is Your Invisible Safety Net
This article looks into the cybersecurity aspects of M&A
read moreThe Hidden Costs of Convenience - A Privacy Audit of Truecaller and Whoscall
This article looks into the use of third party apps to identify caller such as Whoscall or TrueCaller
read moreThe Financial Impacts of Cybersecurity Breaches: A Comprehensive Overview
This article looks into the debate between to do or not to do for cyber investments
read moreCyber TechTalk - Latest trends in Cryptography and Encryption Technologies 2024
This article looks into the current trends in cryptography
read moreMiddle Management Musing - Emerging Cyber Threats 2024
This article looks into middle management emerging cyber threat management for 2024
read moreCyber Breach Incident Response: Data Breach Edition - An ISO-Based Approach
This article looks into incident handling when dealing with data breaches
read more