INTRODUCTION TO MY BLOG
My
blog touches on issues ranging from security threats, vulnerabilities
and exploits to mitigation techniques. Some new technologies pertinent to cybersecurity are also discussed extensively. We take a look at why the attack
is potent and how the attack is carried out in real-time.
It is important to be aware of how an attacker could attempt to gain unauthorized access to information as well as a plethora of other attack vectors.
It is important to be aware of how an attacker could attempt to gain unauthorized access to information as well as a plethora of other attack vectors.
One
major part of information security is identifying and implementing
countermeasures to respond to these threats. It is important for us as
security
professionals to not only identify threats but provide methods to
control the
risks identified. Cultivating this habit would go a long way in helping
us to
be proactive while securing information.
Comments
Post a Comment