Skip to main content
  • Home
  • About Us
  • Jobs
  • HackQuesters Community

Search form

Home
  • Read
    • Security Articles
    • Best Practices
    • Security News
    • Snippets
    • Threat Advisory
  • Security Assessments
  • Contribute
  • Login
Home Sandeep Kumar Dadwal

Sandeep Kumar Dadwal

Primary tabs

  • View(active tab)
  • Track

Follow Us

Featured Articles

HackQuest - Season 4
Thursday, October 17, 2019 - 12:40
ADVANCED PERSISTENT THREATS – The biggest threat to cyber safety
Tuesday, September 24, 2019 - 13:05
XML External Entity Attack
Tuesday, August 27, 2019 - 14:38
Email Security
Monday, August 26, 2019 - 19:40
Importance of Cyber Security Control Automation
Monday, August 12, 2019 - 10:30

Keywords

Cloud Security Compliance Data Protection Privacy Risk Assessment Identity and access management Hacking malware Security Vulnerability Management Information Security IoT Vulnerability Risk Management Application Security Digital Forensics Data breach Internet of Things Data Security Cyber Security
More

Documents and Reports

ADVANCED PERSISTENT THREATS – The biggest threat to cyber safety
Tuesday, September 24, 2019 - 13:05
PDF icon APT_biggest threat to cyber safety.pdf
XML External Entity Attack
Tuesday, August 27, 2019 - 14:38
PDF icon XML External Entity Attack.pdf
Importance of Cyber Security Control Automation
Monday, August 12, 2019 - 10:30
PDF icon Importance of Cyber Security Control Automation.pdf
Apache Tomcat Vulnerability (CVE 2019 0232)
Monday, August 5, 2019 - 13:31
PDF icon Apache Tomcat CVE_CS.pdf
RDP WILL EXPLOITED AROUND THE GLOBE.
Thursday, July 25, 2019 - 12:55
PDF icon RDP WILL EXPLOITED AROUND THE GLOBE.pdf
 
Cyber Security Community

"A meeting point"

The community for security subject matter experts to view & express, industry leading cyber security experiences and best practices . The community covers cyber security global trends, happenings, articles, best practices and snippets across security domains targeted towards CIO, CISO, CTO, Directors, mid level security professionals & executives.

 

Last Viewed

Digital Forensics: Is your private browsing history safe?
Tuesday, October 6, 2015 - 22:45
IronWASP (Iron Web application Advanced Security testing Platform)
Thursday, December 14, 2017 - 14:48
Petya (Petwrap) Ransomware Attack
Thursday, November 2, 2017 - 15:08
Example of true L3 level support
Friday, May 22, 2015 - 14:46
Moving to Cloud: Security Risks and Securely Adopting Cloud
Thursday, September 6, 2018 - 10:11

Best Practices

XML External Entity Attack
Tuesday, August 27, 2019 - 14:38
Uninstall Sophos components using GUID by Powershell
Thursday, July 11, 2019 - 11:28
Exploit PoC: Linux command execution on Vim/Neovim vulnerability (CVE-2019-12735)
Monday, June 24, 2019 - 09:16
ISO Organisation's IT GRC automation evaluation criteria
Thursday, December 6, 2018 - 16:28
Manual Access Re-certification to Avoid Risk of Data Breach
Thursday, March 9, 2017 - 20:14

© Tata Consultancy Services Limited 2015. All rights Reserved.

  • Home
  • Terms and Conditions
  • About Us
  • Security Forum
  • Contact Us