Recently, EncryptAsia was invited to share our knowledge of Cyber Security with the Cyber Security Students of NSBM Green University. …
How to develop a Business Continuity Plan (BCP/DR)
Sometime back, a person asked me about the implementation of the ISO standard for Business Continuity Management System (BCMS), through …
Efail, the PGP Encryption Attack Explained
[UPDATE] There are more updates being circulated on the vulnerability stating that it is not present in the standard, but …
Get to know “Meltdown and Spectre” attacks
Hello! Happy New Year! Welcome to 2018! We have just passed few days in the New Year and welcoming everyone …
Possible FAQs about the KRACK, Wi-Fi Attack
Most of you must have heard about a latest Wi-Fi attack named KRACK lately. May be, you haven’t hear of …
What is a Denial of Service (DoS) attack?
I was having a conversation with a person who runs a company which depends on IT systems. He was saying …
What we learned from WannaCry?
Everyone is talking about the WannaCry ransomware attack lately. People discuss how it happened and how to protect you from …
3 major benefits of implementing
ISO 27001
Information security is the practice of protecting information of a particular entity. Information could be digital or physical. There are …
10 steps to implement ISO 27001 in your organization
ISO 27001 is one of the most popular frameworks used in the world to protect information. Many organizations are willing …
10 things you should do before launching a WebApp
Web applications are more popular among organizations and their customers. Many organizations provide web application access to their customers and …