Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Archives for K K Mookhey » Page 3

  1. Home
  2. Author: K K Mookhey
  3. Page 3

Author: K K Mookhey

Case Studies Fundamentals Incident Response Research

Heartbleed Open SSL Bug FAQ & Advisory

Heartbleed Advisory & FAQ Please find below a quick FAQ on the Heartbleed vulnerability and what you can to address it: UPDATE June 5, 2014: […]

April 10, 2014
0
Case Studies Opinion Research Secure Coding Sql Injection Survey Web Application Security

[Survey] Web Application Security – Getting Coders To Code Securely

Web Application security has become the biggest concern for almost all organizations who wish to bring their business to the Internet. There are various reasons […]

September 6, 2013January 10, 2025
0
Laws & Regulations Opinion

India’s National Cyber Security Policy – Implications for the Private Sector

On the 2nd of July 2013, the Indian Government formally approved and published the National Cyber Security Policy (NCSP). The policy had been lying as a […]

July 21, 2013January 10, 2025
1
Malware Analysis Uncategorized

Indian APT – the Hangover Effect – Full Report

In an earlier blog post I had published the summary of our findings of a malware analysis done, which had a number of common points […]

July 9, 2013January 10, 2025
2
Malware Analysis Uncategorized

Indian APT – the Hangover Effect

In early 2012, a client contacted us with suspicious-looking emails that he had received. There were two emails received by the client. While we completed […]

May 25, 2013January 21, 2025
2
DFIR Research

PCI DSS for Penetration Testing

Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your […]

April 3, 2013January 22, 2025
1
Case Studies Hacks Social Engineering

Social Engineering & "Influence", by Dr. Cialdini

Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing at various organizations. Coincidentally, I […]

June 3, 2010January 17, 2025
5
  • 3 / 3
  • 1
  • 2
  • 3

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top