DennisGit detect dubious ownership in repositoryWhen working in the corporate environment, we usually have a designated user space for each authenticated user on our computer. For…Sep 28, 20227
Prince KhubaybMake sure your incident response plans in intact so you know how to face it when it occur.Jul 11Jul 11
C0rs0Threat Modeling Methodology: The OCTAVE Method and its VariantsInformation security risk management is a critical aspect for companies in today’s digital landscape. With the growing threat of…Mar 11Mar 11
Milind AgarwalThe Future of Information Security with Python: Emerging Trends and DevelopmentsIn an age where cyber threats continue to evolve in sophistication and frequency, the role of Python-based tools in fortifying information…Apr 10Apr 10
DennisGit detect dubious ownership in repositoryWhen working in the corporate environment, we usually have a designated user space for each authenticated user on our computer. For…Sep 28, 20227
Prince KhubaybMake sure your incident response plans in intact so you know how to face it when it occur.Jul 11
C0rs0Threat Modeling Methodology: The OCTAVE Method and its VariantsInformation security risk management is a critical aspect for companies in today’s digital landscape. With the growing threat of…Mar 11
Milind AgarwalThe Future of Information Security with Python: Emerging Trends and DevelopmentsIn an age where cyber threats continue to evolve in sophistication and frequency, the role of Python-based tools in fortifying information…Apr 10
Nishant GroverInformation Security Governance, Risk and Compliance teamNote: All views in this article are my personal and team structure differs upon organization size, infosec team size, and business…Jun 20, 20232
Okan YıldızPrivacy by Design: Safeguarding Data from the StartPrivacy by Design: Safeguarding Data from the StartDec 9, 2023
Meltem YaparinDataBullsImportant Clues to Manage Cybersecurity Risks Related To Your VendorsIn today’s fast-paced business environment, effective enterprise risk management (ERM) is essential. Information security risks are also…Dec 15, 2022