Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Archives for Manasdeep

  1. Home
  2. Author: Manasdeep

Author: Manasdeep

Fundamentals Reading Research Tools

Information Rights Management – Addressing The Need

What is Information Rights Management? Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective […]

August 27, 2013January 22, 2025
0
Compromise Detection Fundamentals Incident Response Reading Research

Data Leakage Prevention – Securing The Data Spillage

What is Data Leakage Prevention? Data Leakage Prevention is the category of solutions which help an organization to apply controls for preventing the unwanted accidental […]

August 21, 2013January 22, 2025
0
Fundamentals Hacks Incident Response

Distributed Denial-of-Service(DDoS) Attacks – Know Thy Enemy

What is a DDoS based attack? A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its […]

August 7, 2013January 22, 2025
2
Fundamentals Reading Research Social Engineering

Spear Phishing – Beware Of Your “Friend”

What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, text or tweet by an […]

August 1, 2013January 22, 2025
0
Compliance Fundamentals Laws & Regulations Opinion Reading

Getting Your BYOD Policy Right

Bring your own device (BYOD) is the business policy of letting employees bring their own devices at workplace for doing work. The concept has gained […]

July 29, 2013
0
Fundamentals Mobile Reading

Mobile Device Management (MDM) – Challenges and Solutions

What is Mobile Device Management? Mobile Device Management (MDM) software secures monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. […]

July 26, 2013January 22, 2025
0
Incident Response Malware Analysis Reading Research

Advanced Persistent Threats – De-Mystifying The Jargon

Introduction Advanced Persistent Threats (APTs) are growing as a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. […]

July 17, 2013January 22, 2025
0
Research Uncategorized Web Application Security

OWASP Top 10 – 2013 Web Application Security Risks

OWASP TOP 10 list is being constantly updated every 3 years to keep pace with the current threat landscape for web application security. Key factors […]

July 4, 2013January 10, 2025
0

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top