Compliance & Audit

Risk & Control Advisor Job Code : CLC-002 Skills: IT Security Management, Application Security, Infrastructure Security, Data Security, IT Assurance Job Responsibilities: Good understanding of & experience with Information Risk Management, Audit (internal and external), and Business (IT) Controls. Advanced understanding of internal and external IT security standards, PCI, GDPR, Qualification: CISSP, CISA, CRISC or […]

MORE
Network Engineer (SECURITY)

Network Engineer (SECURITY) Job Code : CLT-003 Skills: Proficiency in Handling Cisco, Juniper, Checkpoint, Palo Alto etc. Hands own experience in F5 Load Balancer and different LB techniques Extensive support of Routing Protocols/Technologies such BGP, OSPF, Logical Overlay, IOS-XR, MPLS VPN, Multicast. Configure and troubleshoot Layer 2 and Layer 3 protocols. Qualification: : IT Certifications in Cisco […]

MORE
Sales & Marketing Positions

  Sales Executive Job Code: CLSD-01 Position : Sales Executive Skills: Knowledge Selling IT Products/ Services Qualification : B.Tech  or MBA with Technical Background Roles & Responsibilities: Generate new business leads and arrange meetings Identifying and developing new business Preparing and delivering customer presentations and demonstrations of cyber security services and products Contributing to team […]

MORE
What is Denial-of-Service Attacks?

What is Denial-of-Service Attacks? Denial of service attack is a cyber attack in which hackers attack the server/website/computer system/network which prevents the users from accessing the data available Denial-of-service-attacks usually flood servers/networks with lots of traffic in order to affect user and makes it difficult for them to access. Moreover, an attack that crashes the […]

MORE
Cyberlaws- Serverless Applications
Serverless Applications – Vulnerable to Cyber Attacks

What are Serverless Architecture ? The software’s that are build and deployed without the use of virtual or in-house physical server uses a Function as-a-service(Faas) that uses server less architecture. Due to inherent features like scalability and compatibility with cloud services like Azure Function, AWS lambda, google cloud function etc, This kind of architecture has gained […]

MORE
CyberLaws The Chrysalis Economy
The Chrysalis Economy

What is The Chrysalis Economy? Sustainable wealth creation refers to the adaptation of sustainable ways of generation revenues by the companies. A business process is considered sustainable if it fits the triangle of the 3Ps of sustainability: People, Planet, Profit: People: People here, is referred to the society the company is serving. Eg; ‘people’ for […]

MORE
Elements of Business Continuity Management System

What is BCMS (Business Continuity Management System) ? BCMS (Business Continuity Management System) A.K.A ISO 22301, refers to formulation and implementation of plans & policies that maintain the continuity of the organization in the event of a disruption. Elements of Business Continuity Management System (BCMS) BCP (Business Continuity Plan):Is a means to completely plan ahead of […]

MORE
cyberlaws-plagiarism an act of fraud
Plagiarism – Is An Act Of Fraud

What is Plagiarism ? Plagiarism is an act of Fraud – i.e copying/stealing someone’s work/content or borrowing someone’s original ideas/thoughts . But “copying” and “borrowing” can be a serious offense. Plagiarism is considered as dishonesty and a breach of ethics.Plagiarism is not only a crime but it can be termed as violation of law towards copyrighting. […]

MORE
ISO 27001 Certification (Individual vs. Organization)

ISO 27001: ISO 27001 is a standard that is folloVendord for the Information Security Management System (ISMS) of an organization in which, the said company’s compliance status is checked, based on which new policies are created and applied. It’s a mandate in many sectors such as companies involved in the Cyber Security domain.ISMS includes the […]

MORE