PinnedJaibir SinghSQL Injection: Beginner’s guideUse cases to understand SQLi better Use-case 1: Bypassing a LoginSep 3Sep 3
Jaibir SinghIntroduction to SIEM and SOARCost-efficiency by reducing the financial impact of security breaches, which can average $3.4 million per incidentFeb 8Feb 8
Jaibir SinghIT Risk Assessment : A beginner’s guideRisk rankings: According to a template in “NIST guide for conducting risk assessments”, the severity of following categories have to be…Jan 22Jan 22
Jaibir SinghThreat Modelling and STRIDE methodologySTRIDE, an acronym representing Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege…Jan 19Jan 19
Jaibir SinghSocial Engineering 101: Navigating the EssentialsPhishing is the deceptive practice of sending communications across multiple channels, such as social media, text messages, and phone…Jan 18Jan 18
Jaibir SinghNZISM and Zero Trust PolicyIn a Zero Trust environment, the mantra is “never trust, always verify.” This approach mandates continuous verification of the identity andJan 17Jan 17