EC-Council Global Services (EGS)
509 FOLLOWERS
It is a division that is dedicated to helping organizations understand and manage their cyber-security risk posture effectively. We specialize in developing information security knowledge, methodologies, and policies pertaining to information security consulting and managed services. EC-Council's proprietary Licensed Penetration Testing methodology is tried, tested, and endorsed by..
EC-Council Global Services (EGS)
1y ago
Author: Mohamed (Mody) Mohamed, Founder, Covert Comm
Internet of Things (IoT) technology plays an important role in our current modern society by helping us connect almost every activity to the internet and derive customized and high-end technological facilities at our disposition. The wide-scale diffusion brought by IoT act as the driving force for many smart technologies that provide global communications and fast access to information. Due to their numerous benefits, the IoT and wireless sensor networks are considered one among the exponentially evolving domains in the cyber landscape. The ..read more
EC-Council Global Services (EGS)
1y ago
Author: Gabriel Mandefu, Operational Business Analyst, Tenke Fungurume Mining S.A.R.L.
Some of the key concepts in the information security world have two aspects: technical, which refers to use of technology-based methodology to secure your business, and non-technical, which refers to the governance aspect of the security of a company. Risk and vulnerability assessment are part of those concepts. These terminologies are taught no matter which career path you choose in InfoSec. Tons of free material are available online, as well as formal training courses on this subject. However, as with any ..read more
EC-Council Global Services (EGS)
1y ago
Author: Pappu Mandal, Cyber Forensic Analyst, Specialist Advisory & Intervention Group.
Firewalls are the most important network security elements and one of the most targeted components due to its presence on the perimeter of the network. Though firewalls claim to be effective against malicious attempts, due to it being the first line of defense and bearing the motoring’s responsibility, the network traffic is subjected to multiple and repeated threats of attack. Malicious attackers and applications can misuse even the simplest protocols to bypasses the firewall’s control, hence mandatin ..read more
EC-Council Global Services (EGS)
1y ago
Author: Tim Chase, Director of Field Security, Collibra
Internet of Things (IoT) security is a trending issue due to the exponential growth and incorporation of IoT into various businesses and sectors, but IoT penetration testing is different from its traditional counterparts as it includes all the components of digital infrastructure across both information and operations technology domains. The current manuscript describes the various attack vectors and modes an IoT penetration tester could pick for testing the multitude of IoT components such as devices, vehicles, electronics, software, se ..read more
EC-Council Global Services (EGS)
1y ago
Author: Sandeep Jayashankar, Lead Product Security Architect, PayPal.
Penetration testing has become an essential part of digital and information security in most organizations. Much is known about various tools and technical methods used to conduct a well-planned penetration test. But running an effective and successful test requires a certain standard agreed upon and consistently followed by different organizations worldwide. These standards and best practices cover everything related to a penetration test, and the current manuscript attempts to highlight these aspects in brief. The whitepa ..read more
EC-Council Global Services (EGS)
1y ago
Author: Sachin Yadav, Director and Digital Forensic and Incident Response Lead, Big 4 Consulting Firm,
Digital forensics can be described as the process of extraction of important data from an electronic system/network of systems, which can be used as potential evidence against its exploitation or related cybercrime. Identifying, acquiring, extracting, documenting, and preserving such data from digital media like the computer, mobile phone, server, or network is done by a team of qualified professionals called Digital Forensic Investigator. The digital forensic team uses multiple tools and pl ..read more
EC-Council Global Services (EGS)
1y ago
Author: Ankit Satsangi,Virtual CISO & Security Advisor,United Arab Emirates.
At the beginning of the year 2020, the COVID-19 outbreak has been declared a pandemic that has caused huge impacts on people’s lives, families, and organizations’ work culture. With such uncertainties, it has become difficult to gauge the difference between real and fake news. In such a change, cybercriminals are trying to profiteer out of this pandemic.
The post COVID-19 Remote Working – Challenges and Its Impact appeared first on EC-Council Global Services (EGS ..read more
EC-Council Global Services (EGS)
1y ago
Author: Carlos Travagini, CISO, FIEMG.
An organization’s IT environment faces overwhelming security risks and threats. In order to ensure the continuity of their critical IT activities, organizations need to be prepared for a significant crisis beforehand by creating a Disaster Recovery Plan. The development of cloud computing solutions and their adoption within the companies brought in new practices. One of them is popularly known as Disaster Recovery as a Service (DRaaS).
The post Defend Your Security Posture with DRaaS appeared first on EC-Council Global Services (EGS ..read more
EC-Council Global Services (EGS)
1y ago
Author: Abhishek Anand, Market Strategy Advisor, Castellum Labs
With the development of advanced technologies and automation, cybersecurity controls have become omnipresent. Cybersecurity has become an essential and effective way to handle threats and risks. It protects data not only by using secure data platforms but also by implementing security controls within the network and systems.
Though hackers have unveiled ideas to perform an attack using advanced technology, organizations are becoming more alert in safeguarding and strengthening their security postures.
The post Cybersecurity Co ..read more
EC-Council Global Services (EGS)
4y ago
Author: Mohamed (Mody) Mohamed, Information Security Architect, Collegeboard
Internet of Things (IoT) technology plays an important role in our current modern society by helping us connect almost every activity to the internet and derive customized and high-end technological facilities at our disposition. The wide-scale diffusion brought by IoT act as the driving force for many smart technologies that provide global communications and fast access to information. Due to their numerous benefits, the IoT and wireless sensor networks are considered one among the exponentially evolving domains in ..read more