Skip to main content
  • Home
  • About Us
  • Jobs

Search form

Home
  • Read
    • Security Articles
    • Best Practices
    • Security News
    • Snippets
    • Threat Advisory
  • Security Assessments
  • Contribute
  • Login
Home Baskar Srinivasan

Baskar Srinivasan

Primary tabs

  • View(active tab)
  • Track

Follow Us

Featured Articles

Planning AWS Platform Security Assessment ?
Tuesday, April 3, 2018 - 15:45
An Introduction to Identity and Access Management
Tuesday, April 3, 2018 - 15:12
Security Assurance practices to protect an Enterprise’s assets
Thursday, March 29, 2018 - 13:31
To Gain Protection from Cyber Threats, Focus on Managed Threat Hunting
Tuesday, March 27, 2018 - 10:36
Business 4.0 Risks - The New World Order for the CISO
Monday, March 26, 2018 - 20:05

Keywords

Privacy Hacking Application Security Vulnerability IoT Risk Management Risk Assessment Cyber Attack Internet of Things Information Security Security Digital Forensics Compliance Vulnerability Management Data breach Cloud Security Data Security malware Data Protection Cyber Security
More

Documents and Reports

Planning AWS Platform Security Assessment ?
Tuesday, April 3, 2018 - 15:45
PDF icon Article AWS Security Assessment.pdf
Meltdown and Spectre Mitigation
Monday, January 29, 2018 - 13:57
PDF icon Meltdown and Spectre Mitigation.pdf
Is Amazon Web Service (AWS) Cloud Supports Best Cost Effective & High Performance Modern Disaster Recovery?
Wednesday, January 17, 2018 - 11:23
PDF icon Article_AWS_DR_Solution.pdf
IronWASP (Iron Web application Advanced Security testing Platform)
Thursday, December 14, 2017 - 14:48
PDF icon IRONWASP_POC (1).pdf
Retest of Vulnerabilities(QIDs) in Qualys WASs
Wednesday, December 6, 2017 - 12:30
PDF icon Retest of Vulnerabilities.pdf
 
Cyber Security Community

"A meeting point"

The community for security subject matter experts to view & express, industry leading cyber security experiences and best practices . The community covers cyber security global trends, happenings, articles, best practices and snippets across security domains targeted towards CIO, CISO, CTO, Directors, mid level security professionals & executives.

 

Last Viewed

Cost of an individual's data - An overview
Monday, September 12, 2016 - 16:11
CPNI recommendations for Critical Infrastructure Protection: Security Framework
Monday, July 27, 2015 - 19:08
Catch a Thief by Being One : Control the Gain - Part IV
Monday, July 4, 2016 - 14:50
KPIs for measuring Business Continuity Management performance
Thursday, November 24, 2016 - 11:28
How to Exclude False Positive(FP) in Qualys Web Application Scan(WAS)
Saturday, November 4, 2017 - 16:07

Best Practices

Manual Access Re-certification to Avoid Risk of Data Breach
Thursday, March 9, 2017 - 20:14
Security Information and Event Management (SIEM) Solution -Best Practices
Thursday, March 9, 2017 - 16:45
Cybersecurity v1.1 draft (NIST)
Friday, January 13, 2017 - 23:09
Draft SP 800-181 NICE Cybersecurity Workforce Framework (NCWF) by NIST
Monday, November 7, 2016 - 07:44
10 Effective ways to get more out of risk management
Wednesday, September 21, 2016 - 21:18

© Tata Consultancy Services Limited 2015. All rights Reserved.

  • Home
  • Terms and Conditions
  • About Us
  • Security Forum
  • Contact Us