Awareness on New Coronavirus Phishing and Ransomware Attacks
DynamicCISO
March 27, 2020
To help individuals and organizations, we have reached out to cybersecurity experts who have shared their views need to be followed vigilantly.
Here are a few pieces of advice from Dr. Aditya Mukherjee, Vice President at Synchrony.
See publication
Tags: Cybersecurity, Privacy, Risk Management
Security Preparedness for Work From Home
DynamicCISO
March 23, 2020
The spread of coronavirus (aka COVID-19) has compelled many businesses to shift their office-based workforces to remote ones. This has quickly changed the game from a security perspective: an evolving attack surface, proliferating endpoints, new network behaviors, and more.
Due to the pandemic, CISOs are facing an increase in work-pressure and dwindling resources, which can rapidly lead to unmanageable pressure and stress, severely affecting health, happiness and productivity. In turn, this can lead to major security and regulatory compliance issues.
Dr Aditya Mukherjee, Vice President at Synchrony was happy to offer his perspective intended to benefit security teams adapting to the changing landscape.
See publication
Tags: Cybersecurity, Risk Management, COVID19
Enriching thoughts unfolded at the panel discussion on ‘Cybersecurity enabling businesses in COVID-19 situation’
CyberFrat
March 22, 2020
Enriching thoughts unfolded at the panel discussion on ‘Cybersecurity enabling businesses in COVID-19 situation’
See publication
Tags: Cybersecurity, Leadership, Risk Management
Iran - A Worthy Cyber Adversary?
Digital 4n6 Journal
November 01, 2019
Iran - A Worthy Cyber Adversary?
See publication
Tags: Cybersecurity, Leadership, Risk Management
Smart City and related Cyber Security Concerns In India
Dynamic CISO
August 28, 2019
Smart City and related Cyber Security Concerns In India - Quoted. on my views regarding Smart City and related Cyber Security Concerns In India.
See publication
Tags: Cybersecurity, Leadership, Smart Cities
Iranian Cyber Threat Operations - A view from the CISO's & CIO's Perspective
InfoQuest - A Journal on Internet Security by Enterprise It World
July 01, 2019
Iranian Cyber Threat Operations - A view from the CISO's & CIO's Perspective
See publication
Tags: Cybersecurity, Leadership, Risk Management
The World of State Surveillance
PenTest Magazine
March 01, 2017
I still remember the day when one of my close friends watched Mr. Robot for the first time and went into a paranoid frenzy to set up security measures in her mobile, laptop and hard disk. To be honest, I was always aware of these techniques in the back of my mind but somehow watching it on the show made me reconsider my lax, too.
See publication
Tags: Cybersecurity, Leadership, Risk Management
Countering Malware Evasion
Digital 4n6 Journal
November 01, 2016
Malware are becoming more sophisticated (especially the ones associated with APT’s) with the implementation of advance evasive behavior. Gone are the days when ollyDbg use to be a comprehensive utility alone. Today using sandboxes and various automation techniques, the game has changed. But that’s not good enough, automaton is great as it eliminates the need for the analyst to go through each line of the code manually, provide for greater scalability and handle unexplored variants that are not tied to a single signature for detection. But even they have their own shortcomings like the supported structure, efficiency in classification of malicious behaviors, and how evasions are identified and mitigated.
See publication
Tags: Cybersecurity, Leadership, Risk Management
Are you Mr. Robot - The State Surveillance
Indian Cyber Security E-Magazine by National Cyber Defense Research Centre (NCDRC)
October 01, 2016
Today, No digital communication is secure by the virtue that any communication is susceptible to government interception as it happens but far beyond that: all digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.
See publication
Tags: Cybersecurity, Leadership, Risk Management
Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
Packt
November 06, 2020
With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.
See publication
Tags: Cybersecurity, Leadership, Risk Management
The Phoenix of Hacking
Self Published
March 01, 2011
At the time when computers have taken family position in every family and with that level of interception and involvement, Cyber crime and Cyber frauds have also made a noticeable place in cyber world and to have face to face with such criminals we need equally equipped, technocrats and their come the role of an Ethical Hacker.
Ethical hacking ,Information Security, Network security, Penetration testing are among the most echoing among all the computer fields at present time and are interlinked with each other.
The technology that exploded like a nuclear bomb and whose radiations have transacted in every single persons mind, which has now become the backbone of each single industry in the whole world, is none other than “Internet” the magic of World Wide Web, and that is the reason why its security is so much important and this could be possible only through mass awareness programs.
This book will be very much valuable for all those who want to have something new, exciting and fascinating facts in computer fields. It will cover all the basic to advanced features of hacking.
See publication
Tags: Cybersecurity, Leadership, Risk Management
HaX - A Beginners Guide to the World of Ethical Hacking
Self Published
March 01, 2008
In today’s GenX, Computer Security has evolved to be one of the most promising fields as career prospect. Hacking in particular is the mark of the century where geeks are no more just making programs and coding them to optimization but also cracking them for exploiting loopholes in networks, websites and databases across the globe. Ethical hacking puts emphasis on the bright side of hacking and the use of such knowledge for Advancements in the field of Cyber Security.
For all those who have always been keen to dive into this Fascinating world of hacking “HAX” will bring you alive to various techniques such as Information Gathering, Scanning, Penetration, Phishing, Keylogger and many more tools and techniques used by hackers in the real world scenario.
This book will guide you from the basics to the expert level of hacking and also shed light on the various mechanisms that can be used to constantly update your knowledge and also develop your own tools and scripts.
See publication
Tags: Cybersecurity, Leadership, Risk Management
Mastering Machine Learning for Penetration Testing
Packt
September 01, 2017
Mastering Machine Learning for Penetration Testing - Technical Reviewer.
See publication
Tags: Cybersecurity, Predictive Analytics, Risk Management
Hands-On Cybersecurity for Finance
Packt
September 01, 2017
Hands-On Cybersecurity for Finance - Technical Reviewer.
See publication
Tags: Cybersecurity, Predictive Analytics, Risk Management
Hands-On Machine Learning for Cybersecurity
Packt
September 01, 2017
Hands-On Machine Learning for Cybersecurity - Technical Reviewer.
See publication
Tags: Cybersecurity, Future of Work, Risk Management
Times of India - Coverage on Lok Sabha Election 2019
Times of India
May 10, 2019
Times of India - Coverage on Lok Sabha Election 2019
See publication
Tags: Entrepreneurship, GovTech, Leadership
Ethical buddies vs Online baddies - Hacking shop in capital to beat virtual villains, e-policing MIA in East Singhbhum for months
Telegraph India
August 05, 2013
Ranchi now has an ethical hacking company, Gray Hat Private Limited, with corporate offices around 500m from Argora police station on Birsa Munda Rajpath.
In its first event on August 20, a three-hour meet on ethical hacking at the Federation of Jharkhand Chambers of Commerce and Industries (FJCCI) conference hall, Gray Hat will make people aware of what it stands for.
An ethical hacker is a computer expert, who attacks a security system using the methods of a malicious one, but with two major differences.
One, he does so on behalf of an owner to test the security system. Two, he finds out threats that a malicious hacker can exploit and reports the problems instead of taking advantage of them.
Public relations officer of the company Rituraj Pandit said they had taken the services of two ethical hackers, Atul Tiwari of Ranchi and Aditya Mukherjee of Mumbai.
See publication
Tags: Cybersecurity, Future of Work, Risk Management