Yaksas Security
Subscribe
Sign in
Home
Courses
Cyber Safety Initiatives
AKSH Bot
GitHub
Archive
About
Latest
Top
5 Cloud Security Certifications Worth Pursuing
These vendor agnostic cloud security certifications offer a versatile and comprehensive approach to cloud security, enabling professionals to apply…
20 hrs ago
•
Yaksas Security
Share this post
5 Cloud Security Certifications Worth Pursuing
yaksas.com
Copy link
Facebook
Email
Note
Other
What is the Cloud Control Matrix (CCM)?
The Cloud Control Matrix (CCM) is a cybersecurity control framework for cloud computing, developed by the Cloud Security Alliance (CSA).
Oct 7
•
Yaksas Security
Share this post
What is the Cloud Control Matrix (CCM)?
yaksas.com
Copy link
Facebook
Email
Note
Other
5 Cloud Security Best Practices
In this article we outline the top 5 cloud security best practices that you should implement, if you are leveraging cloud services for your…
Oct 6
•
Yaksas Security
Share this post
5 Cloud Security Best Practices
yaksas.com
Copy link
Facebook
Email
Note
Other
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5
•
Yaksas Security
Share this post
Where Should a CISO Report in an Organization?
yaksas.com
Copy link
Facebook
Email
Note
Other
Top Cloud Security Risks
In this article we outline the most critical security risks affecting cloud-based applications.
Oct 4
•
Yaksas Security
Share this post
Top Cloud Security Risks
yaksas.com
Copy link
Facebook
Email
Note
Other
Why Cloud Security Matters?
Businesses are increasingly relying on cloud services to store and manage their data. While the cloud offers numerous advantages it brings unique…
Oct 3
•
Yaksas Security
Share this post
Why Cloud Security Matters?
yaksas.com
Copy link
Facebook
Email
Note
Other
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk…
Oct 2
•
Yaksas Security
Share this post
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
yaksas.com
Copy link
Facebook
Email
Note
Other
CERT-In: The first responders of the Indian cyberspace
This post is part of our series Cybersecurity Chronicles from India. This one is all about the The Indian Computer Emergency Response Team (CERT-In).
Oct 1
•
Yaksas Security
Share this post
CERT-In: The first responders of the Indian cyberspace
yaksas.com
Copy link
Facebook
Email
Note
Other
September 2024
6 Ways to Cover Your Device's Camera
Have you ever wondered that somebody might be watching you though your device's camera? Stay safe with these 6 device camera cover hacks.
Sep 30
•
Yaksas Security
Share this post
6 Ways to Cover Your Device's Camera
yaksas.com
Copy link
Facebook
Email
Note
Other
Why Changing Your Password Every 90 Days May Soon Be Outdated
Are organisations shifting from frequent password changes to longer passwords? Learn about modern trends in password management and how leading…
Sep 29
•
Yaksas Security
Share this post
Why Changing Your Password Every 90 Days May Soon Be Outdated
yaksas.com
Copy link
Facebook
Email
Note
Other
PoshC2: A Red Teamer's Notes
A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.
Sep 29
•
Yaksas Security
Share this post
PoshC2: A Red Teamer's Notes
yaksas.com
Copy link
Facebook
Email
Note
Other
The Three Command and Control Tiers
This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.
Sep 29
•
Yaksas Security
Share this post
The Three Command and Control Tiers
yaksas.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts