Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Archives for K K Mookhey » Page 2

  1. Home
  2. Author: K K Mookhey
  3. Page 2

Author: K K Mookhey

Reading Research

Kick-start your Cybersecurity career in 2022

The new year is always a great time to set new resolutions. And a great resolution is to do things that would help on the […]

December 17, 2021January 20, 2025
0
webinar-cybersecurity-for-remote-workforce-by-kk-mookhey
Uncategorized

[Webinar] Cybersecurity for Remote Workforce by KK Mookhey

[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their employees, this brings a wide […]

May 24, 2020January 20, 2025
0
Uncategorized

Breach Response – Lessons learnt in the past one year

The past 12-18 months we have seen a lot of activity in the area of breach response. We not only launched our Big Data Security […]

June 30, 2017January 10, 2025
3
Uncategorized

Why having a bug bounty program makes sense

Introduction Over the past few years, bug bounties have begun to garner mainstream attention. With over 150 companies offering their own bug bounty programs and […]

December 21, 2016January 10, 2025
0
Case Studies Research Security Testing

Hardware Security Module (HSM) security testing checklist

One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use it to store your debit […]

August 15, 2016January 10, 2025
4
Compromise Detection Incident Response

Ultra-short guide to Big Data and Security

If you are looking to navigate your way through the complexities of Big Data and its use in Security, here are some links to get […]

July 14, 2016January 21, 2025
2
Uncategorized

Updates from Network Intelligence

I am pleased to share the story of our growth so far, specifically the progress made by our Security Solutions Division and the Security Operations […]

February 8, 2016January 21, 2025
0
Compliance Research

Risks in Core Banking Migration

This article highlights some of the key risks in executing a successful core banking migration program. Many of these risk elements also relate to any large IT project, but are more aligned towards a core banking migration.

September 15, 2015
1
Compliance Reading

Social Media Usage in the Enterprise

Introduction With the onslaught of SMAC – Social Media, Analytics, Mobility and Cloud Computing – in our personal as well as professional lives, we are […]

September 7, 2015
0
Fundamentals Reading Research

Metrics For Your Information Security Solutions

Recently, on one of the security mailing lists a query was posted as to what metrics should be produced from a Data Leakage Prevention Solution, an […]

September 14, 2014January 10, 2025
1
  • 2 / 3
  • 1
  • 2
  • 3

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top