• HOME
  • BLOGS
  • ABOUT
  • CONTACT

Articles and Write-ups



Zero Trust Series



Get inspired,



1. Evolution of Security and Perimeter-Based Approach



11th September, 2022



In the decade, post World War 2, computers were mainly secured through physical methods. Perimeter-based security model was adopted through means of Physical Security...

read more

2. Introduction to Zero Trust



16th October, 2022



The traces of the term ‘Zero Trust’ can be traced back to the 1994 Thesis: “Formalising trust as a computational concept” by Harold Thimbleby (Marsh, 1994). Though, it had no relation to Zero Trust from the perspective of Information Security. The term Zero Trust in the...



read more

3. Zero Trust For Enterprise



- - -



Coming soon...


read more

4. Zero Trust for CLoud



- - -



Coming soon...


read more

5. Zero Trust: Limitations and Future



- - -



Coming soon...


read more

Security Blog



Get inspired,



A computer that is deemed secure today will not remain secured indefinitely



24th September, 2023



Computers were initially developed to address or aid specific problems for e.g., to perform complex calculations. Thus initially, ‘digitally’ securing computer...

read more

Breaking Down Cybersecurity Professions



20th December, 2023



Being Ethical Hacker/Penetration Testers are not the only professions in Cybersecurity. Let's Explore more about the lesser known domains..


read more

The Art of Social Engineering: Protecting Yourself from Psychological Hacks



Coming Soon...



This article could explore the tactics and techniques used by cybercriminals in social engineering attacks. It would provide examples of common scams and manipulation tactics, as well as offer practical advice on how to identify and protect oneself from these psychological hacks.


read more

Mobile Security: Safeguarding Your Devices in a Connected World



Coming soon...



With the increasing reliance on mobile devices, this blog post could discuss the importance of mobile security and offer tips for securing smartphones and tablets. It could cover topics such as secure app usage, protecting personal information, and securing mobile networks

read more

Projects.




TryHackMe
CTFs
</>
HackTheBox
CTFs
</>
Scripts
</>
Pentesting Tools
Guide
</>

GitHub Pages



Checkout Github pages - all blogs at one place


Learn more

By Rutvik Belapurkar