Author archive for EGS

  • How to Protect Your IoT from Cyberattacks

    How to Protect Your IoT from Cyberattacks

    Author: Mohamed (Mody) Mohamed, Founder, Covert Comm Internet of Things (IoT) technology plays an important role in our current modern…

    by
  • Vulnerability Assessment:6 Best Steps to Better Security

    Vulnerability Assessment: 6 Best Steps to Better Security

    Author: Gabriel Mandefu, Operational Business Analyst, Tenke Fungurume Mining S.A.R.L. Some of the key concepts in the information security world…

    by
  • How to Secure Firewalls Through Penetration Testing

    How to Secure Firewalls Through Penetration Testing

    Author: Pappu Mandal, Cyber Forensic Analyst, Specialist Advisory & Intervention Group. Firewalls are the most important network security elements and…

    by
  • Penetration Testing Methods for Internet of Things

    Penetration Testing Methods for Internet of Things

    Author: Tim Chase, Director of Field Security, Collibra Internet of Things (IoT) security is a trending issue due to the…

    by
  • Best Security Controls for a Digital World

    Author: Anis Pankhania, Head-Security Operations and Compliance, Capgemini The objective of this White Paper is to discuss how specialized sets…

    by
  • What is Penetration Testing? A Step By Step Approach

    Author: Sandeep Jayashankar, Lead Product Security Architect, PayPal. Penetration testing has become an essential part of digital and information security…

    by
  • Forensics Strategy: Your Guide to Build One

    Forensics Strategy: Your Guide to Build One

    Author: Sachin Yadav, Director and Digital Forensic and Incident Response Lead, Big 4 Consulting Firm, Digital forensics can be described…

    by
  • COVID-19 Remote Working – Challenges and Its Impact

    Author: Ankit Satsangi,Virtual CISO & Security Advisor,United Arab Emirates. At the beginning of the year 2020, the COVID-19 outbreak has…

    by
  • Defend Your Security Posture with DRaaS

    Author: Carlos Travagini, CISO, FIEMG. An organization’s IT environment faces overwhelming security risks and threats. In order to ensure the…

    by
  • Cybersecurity Controls to Alleviate Cybersecurity Risks and Prevent Data Breaches (Enterprise, Network, End point)

    Author: Abhishek Anand, Market Strategy Advisor, Castellum Labs With the development of advanced technologies and automation, cybersecurity controls have become…

    by