Category: Cyber Security

Diagram Description automatically generated

Automated SAST / DAST Pipeline

Automate security checks during application development Figure 1- SAST/DAST Pipeline Architecture DevOps brings together software development and operations to shorten development cycles, allow organizations to be agile, and maintain the pace of innovation while taking advantage of cloud-native technology and...

OT Security : An Introduction

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

What is SOAR?

SOAR, which stands for Security Orchestration, Automation, and Response, is a cybersecurity strategy that involves using automation and orchestration to improve the efficiency and effectiveness of security operations. SOAR involves integrating multiple security tools and processes, such as threat intelligence,...

Secure Cloud Computing

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Security Ops Centre

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Learnings from HackTheBox

Security is a negative goal and no amount of security awareness will qualify as good enough, it is a continuous process. This statement always triggers me to stay ahead in the game of security awareness, and my go-to platform is...