Category: Cyber Security

OT Security : An Introduction

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

What is SOAR?

SOAR, which stands for Security Orchestration, Automation, and Response, is a cybersecurity strategy that involves using automation and orchestration to improve the efficiency and effectiveness of security operations. SOAR involves integrating multiple security tools and processes, such as threat intelligence,...

Homomorphic encryption and Cloud Adoption

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Secure Cloud Computing

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Security Ops Centre

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Learnings from HackTheBox

Security is a negative goal and no amount of security awareness will qualify as good enough, it is a continuous process. This statement always triggers me to stay ahead in the game of security awareness, and my go-to platform is...

Adversary Emulation Tools for Red / Blue Teams

Disclaimer: – This note was written by me (Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....