Skip to main content
  • Home
  • About Us
  • Jobs

Search form

Home
  • Read
    • Security Articles
    • Best Practices
    • Security News
    • Snippets
    • Threat Advisory
  • Security Assessments
  • Contribute
  • Login
  • Stored Cross-site Scripting (XSS) :Understand and Find the Way How to Protect Yourself

    Stored Cross-site Scripting (XSS) :...

    Read more
  • Is Amazon Web Service (AWS) Cloud Supports...

    Read more
  • Bring Your Own Identity(BYOI): The Next Big Thing

    Bring Your Own Identity(BYOI): The Next Big...

    Read more
  • HackQuest 2.0 – Are you ready for the Challenge?

    HackQuest 2.0 – Are you ready for the...

    Read more
  • WannaCry Ransomware Advisory - Tata Consultancy Services (TCS)

    TCS' WannaCry Ransomware Advisory

    Take a proactive approach to security rather than a reactive one
    Read more
  • TCS Security Operations Center Services

    TCS Security Operations Center Services

    Enabling Enterprise Vigilance
    Read more
  • Whitepapers
  • Today's Popular
  • Monthly Popular
To Gain Protection from Cyber Threats, Focus on Managed Threat Hunting
To Gain Protection from Cyber Threats, Focus on Managed Threat Hunting
Tuesday, March 27, 2018 - 10:36

Organizations are building its threat hunting as a service model to address specific cybersecurity threats. But a key to...

Read more
Business 4.0 Risks - The New World Order for the CISO
Monday, March 26, 2018 - 20:05

2017 saw an unprecedented rise in the list of cyber breaches and attacks. The data breach at Equifax resulted in hackers...

Read more
Security Assurance practices to protect an Enterprise’s assets
Security Assurance practices to protect an Enterprise’s assets
Thursday, March 29, 2018 - 13:31

Many Technology Industries says they are well protected from the Security threats due to their strong technical controls,...

Read more
An Introduction to Identity and Access Management
An Introduction to Identity and Access Management
Tuesday, April 3, 2018 - 15:12

Identity and Access Management (IAM) is a system with one or more applications to store and manage user identities in a...

Read more
Planning AWS Platform Security Assessment ?
Tuesday, April 3, 2018 - 15:45

Nowadays most of the customers are working in AWS platform or planning to migrate their existing physical Infrastructure to Cloud. AWS Cloud is...

Read more

Latest Articles

Planning AWS Platform Security Assessment ?
Tuesday, April 3, 2018 - 15:45

Nowadays most of the customers are working in AWS platform or planning to migrate their existing physical Infrastructure to Cloud. AWS Cloud is...

Read more
An Introduction to Identity and Access Management
An Introduction to Identity and Access Management
Tuesday, April 3, 2018 - 15:12

Identity and Access Management (IAM) is a system with one or more applications to store and manage user identities in a...

Read more
Security Assurance practices to protect an Enterprise’s assets
Security Assurance practices to protect an Enterprise’s assets
Thursday, March 29, 2018 - 13:31

Many Technology Industries says they are well protected from the Security threats due to their strong technical controls,...

Read more
To Gain Protection from Cyber Threats, Focus on Managed Threat Hunting
To Gain Protection from Cyber Threats, Focus on Managed Threat Hunting
Tuesday, March 27, 2018 - 10:36

Organizations are building its threat hunting as a service model to address specific cybersecurity threats. But a key to...

Read more
Business 4.0 Risks - The New World Order for the CISO
Monday, March 26, 2018 - 20:05

2017 saw an unprecedented rise in the list of cyber breaches and attacks. The data breach at Equifax resulted in hackers...

Read more

Follow Us

Featured Articles

Planning AWS Platform Security Assessment ?
Tuesday, April 3, 2018 - 15:45
An Introduction to Identity and Access Management
Tuesday, April 3, 2018 - 15:12
Security Assurance practices to protect an Enterprise’s assets
Thursday, March 29, 2018 - 13:31
To Gain Protection from Cyber Threats, Focus on Managed Threat Hunting
Tuesday, March 27, 2018 - 10:36
Business 4.0 Risks - The New World Order for the CISO
Monday, March 26, 2018 - 20:05

Keywords

Digital Forensics Cyber Security Cyber Attack Risk Assessment Vulnerability Management Data breach Compliance Cloud Security Application Security Internet of Things malware Privacy Vulnerability Hacking Data Protection Security Data Security IoT Risk Management Information Security
More

Documents and Reports

Planning AWS Platform Security Assessment ?
Tuesday, April 3, 2018 - 15:45
PDF icon Article AWS Security Assessment.pdf
Meltdown and Spectre Mitigation
Monday, January 29, 2018 - 13:57
PDF icon Meltdown and Spectre Mitigation.pdf
Is Amazon Web Service (AWS) Cloud Supports Best Cost Effective & High Performance Modern Disaster Recovery?
Wednesday, January 17, 2018 - 11:23
PDF icon Article_AWS_DR_Solution.pdf
IronWASP (Iron Web application Advanced Security testing Platform)
Thursday, December 14, 2017 - 14:48
PDF icon IRONWASP_POC (1).pdf
Retest of Vulnerabilities(QIDs) in Qualys WASs
Wednesday, December 6, 2017 - 12:30
PDF icon Retest of Vulnerabilities.pdf

Featured Authors

Srimant Acharya
Srimant Acharya
Yogesh Sharma
Yogesh Kumar Sharma
Satish Kulkarni
Satish Kulkarni
Preet Paramjit Singh
Preet Paramjit Singh
Hussainali Ladha
Brian Cummings
Brian Cummings
Dr. Sundeep Oberoi
Dr. Sundeep Oberoi
Kinshuk De
Kinshuk De
View All Authors
 
Cyber Security Community

"A meeting point"

The community for security subject matter experts to view & express, industry leading cyber security experiences and best practices . The community covers cyber security global trends, happenings, articles, best practices and snippets across security domains targeted towards CIO, CISO, CTO, Directors, mid level security professionals & executives.

 

Last Viewed

Deception technology: New dimension for defense-in-depth
Wednesday, December 6, 2017 - 12:19
e-Discovery and Early Case Assessment (ECA)
Thursday, December 14, 2017 - 14:40
IronWASP (Iron Web application Advanced Security testing Platform)
Thursday, December 14, 2017 - 14:48
TCS' WannaCry Ransomware Advisory
Monday, May 15, 2017 - 13:29
How to Achieve and Maintain ISO 22301 Business Continuity Management Certification?
Friday, January 8, 2016 - 22:00

Best Practices

Manual Access Re-certification to Avoid Risk of Data Breach
Thursday, March 9, 2017 - 20:14
Security Information and Event Management (SIEM) Solution -Best Practices
Thursday, March 9, 2017 - 16:45
Cybersecurity v1.1 draft (NIST)
Friday, January 13, 2017 - 23:09
Draft SP 800-181 NICE Cybersecurity Workforce Framework (NCWF) by NIST
Monday, November 7, 2016 - 07:44
10 Effective ways to get more out of risk management
Wednesday, September 21, 2016 - 21:18

© Tata Consultancy Services Limited 2015. All rights Reserved.

  • Home
  • Terms and Conditions
  • About Us
  • Security Forum
  • Contact Us