Skip to content

Cyber Security Blog

Open Menu
05/04/2021

Vulnerability Assessment Of Windows 7 using Nexpose Tool

VAPT

Penetration testing is performed on Win 7, Win Server 2008, Ubuntu form Kali being the attacker. All the Penetration test is performed on the Virtual…

Nabashree
10/03/2021

How to run Tenable Nessus tool for Vulnerability Assessment?

Tools

Introduction If you work in the field of Infosec, you have probably heard of Vulnerability Assessment (VA). VA is a process of identifying security vulnerabilities…

Vrinda Maini
28/01/2021

Cyber Security Year 2020 Statistics Report

Webinar

Soon when the world went in lockdown during pandemic all the business around world made strategies to ensure business continuity and not many but few…

Chetna
28/01/2021

Cyber Security Myth Debunked

Technology

While providing cyber security services such as VAPT and compliances, we come across many customers. Most of those are either IT heads or CxO’s. Not…

Prashant
04/01/2021

Cyber Security Myth Debunked – More than one antivirus help the infrastructure to be secure

Technology

Fact : It can be more harmful than a help if two separate antivirus are running on the system. Year:2015 Said by “IT Admin of…

Prashant
04/01/2021

Cyber Security Myth Debunked – PHP is more secure than .NET platform

Technology

Fact : PHP or .NET are not secure by default. Its IT person’s skill to secure those. Year:2014 Said by “CTO of an IT product…

Prashant
04/01/2021

Cyber Security Myth Debunked – Physical Security Is Enough For Data Center

Technology

Fact : Physical security is a small component of the big IT infrastructure security puzzle. Many more controls are needed to achieve better data security…

Prashant
04/01/2021

Cyber Security Myth Debunked – Work From Home Does Not Require Internal Network Vulnerability Assessment

Technology

Fact : When teams work from home and connect to office network, the internal vulnerability assessment actually becomes more important than ever. Year:2020 Said by…

Prashant
04/01/2021

Cyber Security Myth Debunked – ISO27001 compliance can be implemented using a checklist

Technology

Fact : ISO27001 or any other compliance needs a detailed review of risks which cannot be captured using a mere checklist. Year:2019 Said by :…

Prashant
04/01/2021

Cyber Security Myth Debunked – Costly firewall is the best protection for IT Security

Technology

Fact : Its not the cost of firewall, but how you configure it securely is what matters the most Year : 2018 Said by :…

Prashant

Posts navigation

Older posts
Newer posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3