BLOG
Buzzword Talk: ‘Meltdown – Spectre’
“Meltdown & Spectre again !!” – This is the most popular happening in cybersecurity now. It’s a known fact that Meltdown & Spectre exploit critical hardware vulnerabilities in modern processors. Let’s have a look at Meltdown-Spectre in detail. In the starting of 2018, it was...
Serverless Computing – AWS Lambda
Of course, nothing works in the cyber world without servers and we can term ‘Serverless Computing’ a misnomer. Serverless Computing adds another layer of abstraction on top of the cloud infrastructure, where developers can work without worrying about the underlying infrastructure including the...
AWS Elastic Beanstalk
Cloud computing has brought revolution by making IT – Servers, Storage, Database, Networking, Analytics, Software & more - available over the internet (i.e. ‘cloud’). Even though there is an increased risk in security due to exposure, adopting cloud can hugely reduce cost, increase...
Hosting Service and Hosting Support – an overview
This IT-driven era demands a strong presence in the cyber-space, especially for enterprises to succeed. This can be achieved through websites, which is the digital presence of any worldly entity. Nowadays, everything from personal pages, advertisements, e-commerce to sophisticated...
Hadoop – Big Data Analytics : an overview
To understand about Hadoop, we need to have an idea about Big Data and Big Data Analytics. Row data has no value. It only becomes valuable on getting processed to produce results, where these results can give insights in taking the right decisions for implementing the most suitable...
Buzzword Talk – ‘GDPR’
Let’s talk about the most popular term now, GDPR. General Data Protection Regulations or GDPR is the regulation of European Union Law (EU Law) on data protection and privacy as well as on issues related to the export of personal data, for all individuals in EU and Europen Economic Area....
Server Hardening – Linux
In today’s IT era, faster technological advancements have given ways to increased security threats. Security holds a major role in making the information systems efficient, which in turn determines today’s business success. So today, ensuring and maintaining information system security is...
Linux Server Auditing
A server is a computer hardware or program which provides services to another computer hardware or program, known as the client (and in turn, to its users). Mostly server and client will reside in separate computing systems or hardware (in which case it can be on similar computing system),...
Managing Increased Security Threats
Information technology is getting updated fast, which is revolutionizing every walk of life. Along with these technological advancements, security threats are also increasing in the arena of cyber world. Newer technologies have opened newer ways for threats. Let’s have a look at newer...