Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Archives for Lionel Faleiro

  1. Home
  2. Author: Lionel Faleiro

Author: Lionel Faleiro

Uncategorized

Stalkerware – Is Somebody Watching You?

Trigger Warning – Abuse, Stalking, Death She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why […]

April 9, 2021
0
Uncategorized

Vulnerabilities and Privacy Issues with Clubhouse App

Clubhouse and its exponential growth during COVID-19 Clubhouse is an invite-only audio-chat iPhone app founded by Paul Davison and Rohan Seth. It allows users to […]

March 12, 2021January 20, 2025
0
DFIR

Super Timeline Using ELK Stack

  ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible for processing incoming data. It […]

September 7, 2017
1
Threat Advisory

NII THREAT ADVISORY – 24 AUGUST 2016

Penetration Testing as per PCI DSS version 3.2 As per PCI DSS v3.2, Requirement 11.3 addresses penetration testing activity for organizations following PCI DSS compliance. […]

August 24, 2016January 21, 2025
0
Threat Advisory

NII Threat Advisory | 5th August 2016

Vendor Patches: Google Releases Security Update for Chrome Cisco Releases Security Update Oracle Releases Security Bulletin Apple Releases Multiple Security Updates Drupal Releases Security Advisory […]

August 5, 2016January 21, 2025
0
Uncategorized

Network Intelligence India – Threat Advisory (8 Feb, 2016)

From Our Blog: Data Privacy – An Introduction by Latha Sunderkrishnan (Senior Consultant) When companies and merchants use data or information that is provided or […]

February 8, 2016January 10, 2025
0
Interview

An Interview with Mr. K K Mookhey on Indian InfoSec Trends by Varun Haran

Starting out with enterprises equating information security with just having an antivirus, or a firewall, to cutting edge technologies are being adopted in security today – […]

November 3, 2015January 10, 2025
0
Case Studies Compliance Laws & Regulations

IT Act 2000 – Penalties, Offences With Case Studies

Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating officially as: “to provide legal […]

June 24, 2014January 10, 2025
6
Case Studies

RBI Gopalakrishna Committee Report on IT

The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The […]

July 1, 2013January 22, 2025
0
Uncategorized

Thanksgiving gift from NII alumni – Khushbu Pratap nee Jithra

When we heard Khushbu Pratap’s name cropping up in Gartner’s explanation on its Magic Quadrants, we thought we would ask her about how her experience working at NII […]

November 16, 2012January 10, 2025
0
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top