Viresh Garg, CISSP, CCSP, CISM, CISATop NHITDR Rule and AI-Based Detection Use CasesExecutive SummaryOct 3Oct 3
Viresh Garg, CISSP, CCSP, CISM, CISAShiftleft and Segregation of Duties Policies for Minimizing NHI ExposureWe have discussed a lot for API provider and API consumer responsibilities and lets dive into details of DevSecOps of the consumersSep 30Sep 30
Viresh Garg, CISSP, CCSP, CISM, CISANHI Use Case-1: Cross-Organization API Acess using API KeysSecuring API Keys in Cross-Organizational API Exposures within Decentralized and Federated IAM/IGA FrameworksSep 29Sep 29
Viresh Garg, CISSP, CCSP, CISM, CISANHI CharacteristicsNon-Human Identities (NHIs): Characteristics and Cybersecurity ImplicationsSep 26Sep 26
Viresh Garg, CISSP, CCSP, CISM, CISANHI-Related Threats and Risk: Historical CyberattacksExecutive SummarySep 25Sep 25
Viresh Garg, CISSP, CCSP, CISM, CISATop 25 Usecases in Modern Cloud Native Distributed Apps where NHIs are usedTop-25 usecases demonstrating pervasiveness of NHIsSep 25Sep 25
Viresh Garg, CISSP, CCSP, CISM, CISARationalizing the Prolification and Decentralization of Detect and Response in a Unified…Lets understand market and rationalize our architectureSep 18Sep 18
Viresh Garg, CISSP, CCSP, CISM, CISAAccount Takeover By Malware: When and HowVarious ways ib which credentials are stolen and accounts are compromised resulting into Malware doing ATOSep 16Sep 16
Viresh Garg, CISSP, CCSP, CISM, CISAIR Playbook VI: Malware Detection, Quarantine and EradicationContinuation of the IR SeriesSep 15Sep 15
Viresh Garg, CISSP, CCSP, CISM, CISAMalware Detection: Architecture Blueprint Pre-Attack for Effective Response During AttackWhat is Malware? How to prevent its entry and contain the damage it could cause.Sep 15Sep 15