Meera TamboliReflections on My Masters in Cyber Security Management — Module 1I’m thrilled to share that I’ve successfully completed all the modules in my MSc in Cyber Security Management at the University of Warwick…Aug 22Aug 22
Meera TamboliCTF Tools & UtilitiesI recently participated in the SANS CTF for the WiCys Security Scholarship 2023 tier 1. The CTF lasted for 3 days and there were over 1000+…Sep 12, 2023Sep 12, 2023
Meera TamboliYou must have heard of ISO/IEC 27001.ISO/IEC 27001 is an international standard to manage information security. The implementation of ISO/IEC 27001 has many benefits such as…Jun 14, 2023Jun 14, 2023
Meera TamboliNIST Risk Management Framework (SP 800–37 Rev.2)The NIST Risk Management Framework (SP 800–37 Rev.2) consists of 7 steps — Prepare (P), Categorize ©, Select (S), Implement (I), Assess…Mar 19, 2023Mar 19, 2023
Meera TamboliSecurity Audit Process/MethodologyWhenever you decide to audit a company, it involves several phases. These phases might change from company to company but I’ve jotted down…Feb 16, 2023Feb 16, 2023
Meera TamboliNIST CSF CoresThe NIST CSF (Cybersecurity Framework) core is like a set of desired cybersecurity activities and outcomes. It guides organizations in…Feb 15, 2023Feb 15, 2023
Meera TamboliWhat would it be like if you hired a watchman just to protect the front gate of your house because…I wouldn’t capture your attention if I said “Importance of Cyber Security news” would I?Jan 30, 2023Jan 30, 2023
Meera TamboliRole of development of IoT in the automation of the world“The Internet of Things assures automation and data exchange. This will change our future and the way we work and live.”May 18, 202123May 18, 202123
Meera TamboliAnother project just for marks?How many projects have you listed on your resume?Apr 14, 2021Apr 14, 2021
Meera TamboliBasic Linux Commands for Beginnersls -> Displays a listing of information about files. Its default behavior is to return a list of files contained within the current…Apr 6, 2021Apr 6, 2021