Amitabh SrivastavaJun 13, 20206 minBuilding a Information Security PolicyAn information security policy (ISP) is a set of rules, policies and procedures designed to ensure all users and networks within an...
Abi Tyjas | Amitabh SrivastavaJun 7, 20207 minThe Art and Science of PentestingMan is a social animal, our urge to connect to other and interact in in built in our DNA. In todays hyber connected world perhaps we are...
amitabhsr6Jun 5, 20209 minRisk Assessment @ Cyber Quotient®A cyber security risk assessment is about understanding, managing, controlling and mitigating cyber risk. Cyber risk is defined as...
amitabhsr6Jun 2, 202010 minExploiting the Weakest Link - 'Humans' | Social EngineeringThe weakest link in the security chain is the human who accepts a person or scenario at face value. It doesn’t matter how many locks and...
Amitabh Srivastava ( Ricky )Jun 1, 20183 minThe Ghost Within !#Cybertrek || The Ghost Within Like everything in our life what we can’t see , touch, hear or smell our senses seem to simply ignore it....