PinnedPublished inSystem WeaknessHunt them in WindowsWhat is Windows Event Log?Jan 29, 2023Jan 29, 2023
Published inAWS TipColumnar DB DemystifiedAuthor’s Note: There is connection between “Data Lake” and “Columnar Databases”, Know it right!Aug 15, 2023Aug 15, 2023
ETL vs ELT — Choose your “Data Battles” wisely | 1st PartIn today’s data-driven world, information surrounds us in every move of our life. Data logs are generated from using mobile phones…Jul 14, 2023Jul 14, 2023
Published inSystem WeaknessAWS Security Lake (Data Lake)Before we dive into our discussion, I would suggest that you have a clear understanding of Database , Data Warehouse and Data Lake.Jun 10, 2023Jun 10, 2023
Can I clone you?"A digital twin, a clone so grand, Crafted with AI and voice command. A voice so real, it's hard to tell, If it's a human or machine as…Feb 6, 2023Feb 6, 2023
Published inSystem WeaknessGuide to ITAMA key step in building a successful security program is identifying and listing down the assets of your organization.Jan 17, 2023Jan 17, 2023
Published inSystem WeaknessSecurity Risk Assessment: Threat ModelingThreat modeling in information security is the process to identify, analyze, and prioritize the potential security threats for the…Jan 8, 2023Jan 8, 2023
Published inSystem WeaknessDetection Engineering Automation: ChatGPTChatGPT is the latest buzzword, but its capabilities go far beyond just answering a few questions.Dec 30, 20221Dec 30, 20221
Salesforce CRM Security: Are you secure?Salesforce is a cloud-based solution that enables businesses to find more business leads, better customer outreach, helps in managing new…Oct 30, 2022Oct 30, 2022