Secure Your Digital Inforamation

Latest Buzz

Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

If you haven’t recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim

Read the entire report at thehackernews.com

Latest Posts

Organizations need to get ready with Digital Forensic: Part 2

Integrating Forensic with other IT security activities Forensic readiness is complementary to, and an enhancement of, many existing information security activities.  Policy Update – Updating IT policies appropriately for inclusion of Digital Forensic related terms Asset Management – It is important to know which assets are subject to target and potential sources for evidence gathering Risk Management – It should be part of an information […]

Read Me 1 Comment

Organizations need to get ready with Digital Forensic : Part 1

Most commonly, forensic investigation of digital evidence is done as a post-event response to a serious information security incident and given an option, IT department of most of the orgnizations would prefer to avoid it given the timeframe, cost and wide range of staff impacted with such investigations. However, monitoring, analyzing and investigating digital evidences as a standard practice can actually help organizations to avoid […]

Read Me Leave comment

Digital Incidents Paradigm: Beyond Conventional Cyber Crimes

Cybercrime has become the biggest threat to digital information, causing reputational and financial damage to businesses and individuals around the globe. Cyber attacks are now impacting not only individuals who are online but also those are not online, for example, one of the cyber-attacks have disrupted the availability of electricity in thousands of homes in Eastern Europe. Therefore Digital Forensics practice, which deals with acquisition-preservation-analysis […]

Read Me Leave comment

Services

Training

Our Approach to Corporate Trainings: 1. PRE-TRAINING This is the preparation stage where much of the thinking, brainstorming and planning takes place. Pre-training discussions are utilised to gain knowledge about organisation operations, security concerns, applicable regulatory obligations, HR/business/IT policies those are to be obliged by employees.  It helps to:   Get to know your workforce and the company cultures influencing them Create a training roadmap […]

Assessment

1. Digital Forensic readiness

Advisory Services

Advisory for security strategies and solutions that align business priorities with technology options

WP Facebook Auto Publish Powered By : XYZScripts.com