TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
Cyber Security
FOLLOW
Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Articles
(36)
Blogs
(10)
Resources
(0)
Videos
(1)
News
(16)
Articles
ZeroThreat: The Ultimate Web App and API Security Scanning Tool
Identify critical vulnerabilities at 5x speed without any configuration required with world's most intelligent web app & API security scanning platform, ZeroThreat. Avoid pitfalls of 90% ma...
Jigar Shah
Apr 03, 2024
Cyber Defense Using Artificial Intelligence
Cyber Defense involves safeguarding data from unauthorized access through various techniques such as Machine Learning and Deep Learning. The application of Machine Learning using Random Forest clas...
Aishwarya Gupta
Mar 29, 2024
External Streaming Data - Bitstream Format
The main aim of this article is to extend knowledge related to object-oriented programming focusing on interoperability between the computing process and data visualization, archiving, and networki...
Mariusz Postol
Feb 14, 2024
Cybersecurity of External Streaming Data - Non-repudiation
This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part...
Mariusz Postol
Feb 14, 2024
Cybersecurity of External Streaming Data - Integrity
This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity o...
Mariusz Postol
Feb 14, 2024
Cybersecurity of External Streaming Data - Confidentiality
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pr...
Mariusz Postol
Feb 14, 2024
Google and Yahoo Unveil New Email Authentication Standards
Email remains a cornerstone of communication in the digital age, facilitating interactions between individuals, businesses, and organizations worldwide. However, the ubiquity of email also makes it...
Subham Ray
Jan 29, 2024
🖥️ Incident Handling: Common Malware Attacks
Explore the realm of malware attacks, unveiling the intricacies of threats like ransomware, computer viruses, worms, Trojan horses, and adware. Delve into their types, characteristics, and potentia...
Kuppu Swami
Jan 23, 2024
🖥️ Incident Handling: Common Domain Attack Types
In this article, we will go through different types of Domain Attacks. Domain attacks, including Typosquatting, Domain Hijacking, Pass the Hash, Pass the Ticket, LDAP Reconnaissance, and Brute Forc...
Kuppu Swami
Jan 22, 2024
🖥️ A Guide to Web Attack Incident Handling
In this article, we will explore various types of web attacks, including Denial of Service (DoS) and Distributed Denial of Service (DDoS), SQL Injection, Cross-Site Scripting (XSS), Command Injecti...
Kuppu Swami
Jan 17, 2024
Data Loss Prevention (DLP) in 2024
In the ever-evolving landscape of cybersecurity, protecting sensitive data has become a paramount concern for organizations across industries. As we usher in the year 2024, the significance of robu...
Subham Ray
Dec 18, 2023
DoS & DDoS attacks
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are malicious attempts to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a...
Kirtesh Shah
Sep 27, 2023
Future Scope of Cyber Security Engineer in India
In this article, you will learn more about what the future holds for cyber security engineers in India.
Madhuri Hammad
Aug 25, 2023
Activation Link Vulnerability
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Lokesh Varman
Apr 22, 2020
What is MTA-STS and TLS-RPT
MTA-STS, short for Mail Transfer Agent - Strict Transport Security, is an email security protocol designed to enforce secure encrypted connections between email servers. It aims to prevent man-in-t...
Subham Ray
Aug 07, 2023
Types of cyberattacks
Explore the world of cyber attacks, from web-based threats like phishing to system-based ones like viruses and worms. Stay vigilant against evolving cybersecurity challenges.
Naveen G
Aug 01, 2023
What is BIMI?
BIMI, short for Brand Indicators for Message Identification, is an email authentication standard that allows organizations to display their brand logos alongside authenticated email messages. It bu...
Subham Ray
Jul 05, 2023
Breaking Down the CompTIA Certification Pathway: Which One is Right for You?
Overview of the different CompTIA certifications and helps readers to determine which certification is best suited for their career goals, experience, and skills. The article covers a variety of ce...
Ramon Smith
Mar 29, 2023
Anonymization Techniques for Data Protection and Privacy
An anonymizer is a tool or service that is used to anonymize data by removing or obfuscating identifying information from a dataset, while still allowing the data to be analyzed or used for researc...
Tuhin Paul
Mar 20, 2023
What is XDR?
Learn about XDR [Extended Detection and Response] and its benefits.
Subham Ray
Mar 17, 2023
No Records Available.
View More
Learn Python
Challenge yourself
Thought Leader
E-Book Download
Get Certified
MongoDB