Author name: Shahrukh Mirza

Shahrukh, is a passionate cyber security analyst and researcher who loves to write technical blogs on different cyber security topics. He holds a Masters degree in Information Security, an OSCP and has a strong technical skillset in offensive security.

Shahrukh Mirza
blog banners 29 768x292 1

Cyber insurance statistics – payouts, claims and facts

A data breach may not only damage your computer system or IT infrastructure, but it may also destroy your brand reputation. The consequences of a data breach may be very horrific, which may lead organisations, whether they be large companies or small businesses, to bankruptcy. In short, a data breach may impact an organisation in …

Cyber insurance statistics – payouts, claims and facts Read More »

Blog banners 15

WAAP (Web Application & API Protection) security and its importance in 2022

WAAP stands for web application and API protection. As you can notice that this WAAP term is made of two different terms Web Application and API protection. A Web application and API are the most critical components of every device connected to the internet. So Let’s understand both of these terms one by one. A …

WAAP (Web Application & API Protection) security and its importance in 2022 Read More »

BYOD security guide for disaster preparedness: risks and best practices for implementing bring your own devices.

BYOD Security risks and best practices you can implement

The trend of “bring your own device(BYOD)” is increasing in popularity as more and more employees use their devices for work purposes. While BYOD can offer many benefits to businesses, such as increased productivity and flexibility, it poses some security risks. To protect your business from these risks, it is essential to have your device …

BYOD Security risks and best practices you can implement Read More »

Container security best practices: A comprehensive guide to securing containers

Container security best practices: Your guide to securing containers

Over the last few years, there has been a huge adoption of containers. Actually, container technologies have existed for a while, but in 2013, the launch of Docker gave popularity to containers. Docker shows organisations how they can go for container-first development and operations mode. But along with the increase in the use of containers …

Container security best practices: Your guide to securing containers Read More »

Copy of Copy of AZ Temp2 6

SASE vs Zero Trust and ZTNA vs VPN – Understand It All!

In the digitised world, the importance of cyber security is on the verge of becoming an intense rat race. With humongous damages suffered every second, organisations and cybercriminals are constantly competing against each other to succeed by either securing sensitive data and confidential data or by compromising the organisation, respectively. Before 2020, there was almost …

SASE vs Zero Trust and ZTNA vs VPN – Understand It All! Read More »

Copy of Copy of AZ Temp2 2 1

Serialize vs Deserialize in Java (with examples)

At that time, when the internet was new, applications only used a few basic high-level programming, didn’t have much functionality, and user interaction was minimal. With the advent of technology, applications have become more advanced. New frameworks and development languages, having a lot of accessibility and user-interactive features, are being introduced frequently, offering more dynamic …

Serialize vs Deserialize in Java (with examples) Read More »

Copy of Copy of Copy of Information security parts 1

What is Corporate Espionage? Types, Examples and Myths

Using espionage methods for commercial or financial gain is known as corporate espionage, sometimes called industrial espionage, economic espionage or corporate spying. When we think of “espionage,” we usually imagine spies from one country attempting to obtain information about another. However, many of the same techniques — and even many of the same spies — …

What is Corporate Espionage? Types, Examples and Myths Read More »

Scroll to Top