INTRODUCTION TO MY BLOG


My blog touches on issues ranging from security threats, vulnerabilities and exploits to mitigation techniques. Some new technologies pertinent to cybersecurity are also discussed extensively. We take a look at why the attack is potent and how the attack is carried out in real-time. 
It is important to be aware of how an attacker could attempt to gain unauthorized access to information as well as a plethora of other attack vectors.
One major part of information security is identifying and implementing countermeasures to respond to these threats. It is important for us as security professionals to not only identify threats but provide methods to control the risks identified. Cultivating this habit would go a long way in helping us to be proactive while securing information.


Comments

Popular posts from this blog

SQL Injection

XML EXTERNAL ENTITIES (XXE) INJECTION ATTACK