Image
NASMS alignment with RBI-UCBs Cybersecurity Guidelines

Roadmap to achieve Comprehensive Cyber Security Framework for Urban Cooperative Banks (UCB's) alignment with NASMS

  • May 04, 2023
Image
NASMS alignment with RBI-RCBs Cybersecurity Guidelines

Roadmap to achieve Comprehensive Cyber Security Framework for Rural Cooperative Banks (RCB's) alignment with NASMS

  • April 26, 2023
Image
Log4jShell

In the year 2021 log4j will emerge as a critical security challenge for global industry.

  • Jan 31, 2022
Image
Global Approach

Network Traffic Analysis as one of the Top Technologies for Security in 2017.

  • Jul 5, 2021
Image
Gartner Top Technologies for Security in 2017

How EDR, remote browsers, and cloud ...

  • Jul 5, 2017
Image
Metasploit Wrap-Up

which allow JNDI features used in configuration, log messages, and parameters, do not protect against attacker controlled LDAP and other JNDI related endpoints ...

  • Dec 17, 2021
Image
The Everyperson’s Guide to Log4jShell (CVE-2021-44228)

If you work in security, the chances are that you have spent the last several days urgently responding to the Log4jShell ...

  • Dec 17, 2021
Image
How to Protect Your Applications Against Log4jShell With tCell

By now, we’re sure you’re familiar with all things Log4jShell – but we want to make sure we ...

  • Dec 17, 2021
Image
Test for Log4jShell With Insight AppSec Using New Functionality

We can all agree at this point that the Log4jShell vulnerability (CVE-2021-44228) can rightfully be categorized as a celebrity vulnerability ...

  • Dec 22, 2021
Image
Approch to a Customized Network Traffic Analysis (NTA) Tools

Network Traffic Analysis in short “NTA” is a name coined by GARTNER. In this Technology driven world the industries have ...

  • Jan 18, 2021
Image
ISO 27001:2022. What has changed?

In the digital age, protecting sensitive and confidential information has become more critical than ever before ...

  • Jan 10, 2024
Image
Key Solutions for Data Loss Prevention

At Wissen Baum DLP solutions to secure data across Endpoints, Networks, and Cloud environments with Policy, Pepole, and Processes...

  • Apr 30, 2024

Copyright Wissen Baum, All Right Reserved.