Cyber Docs

General Cybersecurity Interview Questions

Rohit KharatCyber Security Expert, Trainer and ConsultantGeneral Cyber security Interview Questions What are the key differences between Symmetric and Asymmetricencryption? What do you mean by Cyber security?Cyber security is the combination of best processes and practices to ensure the securityof networks, computers, programs, data and information from attack, damage orunauthorized access. What is the least […]

GDPRVsNISTVsISO

In August 2019, ISO has published ISO/IEC 27701 for privacy information management as an extension to ISO/IEC 27001 and ISO/IEC 27002. This can be interpreted as ISO’s attempt to gather information security management system (ISMS) and privacy information management system (PIMS) requirements under one umbrella. Almost the same trend is apparent in the NIST context, especially from NIST SP 800-53 revision 4 and currently on […]

DLP Systems: Pros and Cons

Protecting a company’s network against data leaks is the first priority of any security officer.However, this task is becoming more complex because of strong competition and the popularityof Bring Your Own Device policies. Though there are a wide variety of cybersecurity solutions onthe market, choosing the wrong system may lead to security gaps. Data leak […]

Data Protection And Blockchain

Data protection plays a major role in many blockchain-based project ideas, and presents issues whichare not always easy to resolve.Blockchain is a technology which enables the protection of data against manipulation. So, in thissense, it increases the security of data. However, simply put, this security is achieved by making therecords saved in the blockchain transparent […]

The History of Cybersecurity

About forty years ago, words like worms, viruses, trojan-horse, spyware, malware weren’t even a part of conventional information technology (IT) vocabulary. Cybersecurity only came into existence because of the development of viruses. But how did we get here? The history of cybersecurity began as a research project. In the 1970s, Robert Thomas, a researcher for BBN Technologies […]

Philippine National Privacy Commission CCTV Use Guidelines In Brief

To ensure the lawful processing of personal data in the use of closed-circuit television(CCTV)1systems, the Philippine National Privacy Commission (NPC) released on 16 November 2020,Advisory No. 2020-04 on the “Guidelines on the Use of Closed-Circuit Television (CCTV) Systems”(NPC Advisory No. 2020-04).The Advisory guides personal information controllers (PICs) and personal information processors(PIPs) in the processing of […]

12 Cyber Security Questions To Ask Your CISO About Cyber Risk

Every director should have a general understanding of cyber security risk and what it means fordirectors’ oversight responsibilities.Regulatory pressures (most notably, the EU General Data Protection Regulation (GDPR) and theDirective on Security of Network and Information Systems (NIS Directive), an increasing reliance ontechnology and big data, and the evolving threat environment place significant obligations onorganisations […]

InfoSec Encyclopedia

This is an ongoing compilation of resources we have found helpful and tools we use. If you’re new to InfoSec and are looking for a concentrated list of resources to get started, check out Getting into InfoSec and Cybersecurity. Table of Contents Resources Tools Used Our Reports Our Open Source Software License Table of Contents […]

Cybersecurity products and cloud security

Industries Solutions Insights & News About us SearchX Cloud security Hybrid Cloud Security for the Digital Enterprise Are you using the cloud securely? The Cloud itself is not ‘less’ secure than existing Data Centers or on premise legacy environments… we are hearing more and more about Cloud security incidents… as more and more data is […]

The Elegant Answer to Your O365 Security Problem

The Heart of Our Office 365 Protection Launch AI-driven MDR to Secure Your Complete O365 PlatformBook Your Free Demo Managed Detection & Response for Office 365 Protect every asset, process, and user in your O365 deployment The Elegant Answer to Your O365 Security Problem Managing your O365 security controls can feel like a full-time job, […]