What is Whaling?

Whaling is a specific kind of phishing targeted at high-ranking bankers, executives or others in powerful positions or job titles. This highly targeted phishing attacks (masquerading as legitimate emails) that are aimed at senior executives. Those who are engaged in whaling may, for example, hack into specific networks where these…

Continue reading

World of DevOps

Definition DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and information technology professionals while automating the process of software delivery and infrastructure changes. DevOps emerged from an effort by businesses to respond more rapidly to market…

Continue reading

IDS-IPS-SIEM on corporate network

Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security information and event management (SIEM) tools are critical part of a corporate or enterprise network. An Intrusion Detection System (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. There are network based (NIDS)…

Continue reading

Shadow IT- the ignored threat

Shadow IT, the use of technology systems and solutions without the explicit approval of the organization. Shadow IT is happening right now in your organization, you just don’t know it. Your data is at risk, or could even be breached already, and you don’t know it. At least not yet.…

Continue reading

My experience with TOGAF Certification

I started thinking of getting certified in TOGAF after working various application projects working as a Solution Architect. Though my projects were not large scale but my involvement was pretty intense. Being worked in over 20+ projects in a 8 year period, I started seeing that I enjoyed my experience.…

Continue reading

Security Layers-SSL 128,256,1024 bits

In the world of web security, SSL or Secure Socket Layer is a widely referenced term. SSL is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser. Many organizations mainly dealing with customer information or personal information is…

Continue reading

Service/Help Desk SPOC – ITIL Based

When creating an Information Technology Help Desk or Service Desk, the most common and well used framework or methodology is by ITIL – Information Technology Infrastructure Library. ITIL framework revolves around the discipline of IT service management (ITSM). ITSM takes you through the best practices of creating a ITIL based Support System…

Continue reading

Responsive websites

The concept of responsive website has been give much attention. One could say that it is the “hot” topic in the web world. Though the concept of making very website fit into multiple screen size has been an approach most web developers keep in mind, but making them mobile compatible…

Continue reading

MPLS, Secure VPN & MPLS VPN

There has been a mixup between an MPLS connection and Secure VPN connection. During one of my recent engagements to upgrade our corporate infrastructure, I came across these terms very often and it became quiet confusing as when companies who provide sVPN connection started to brand themselves as MPLS providers;…

Continue reading

VOIP or Not to VOIP

Voice over Internet Protocol (VOIP) is one of the most prevalent topics today in the technology industry. As we grow more reliant on internet and its communication channels, the attraction to an internet based phone system cannot be undervalued. Since most of the markets and corporations understand a users demand…

Continue reading