Skip to content

Privacy, Security and technical blog!

Information Security and technical blog!

  • About Me!!
  • Contact me!!
  • Mission – IIT – R!!
  • 7 Habits of Highly Effective People
    • Habit 1: Be Proactive
    • Habit 2: Begin With the End in Mind
    • Habit 3: Put First Things First
    • Habit 4: Think Win Win
    • Habit 5: Seek First to Understand, Then to be Understood
    • Habit 6: Synergize
    • Habit 7: Sharpen the Saw
AI Information security Privacy

The AI Puppet master!

September 21, 2024October 8, 2024 Jayanthi

Even as the technology buzzword from 2022 seems to be “AI” and everyone is talking about it, learning about it or creating content about it(inclusive

Read More
Information Security Privacy

Security and Privacy implementation

September 11, 2024September 11, 2024 Jayanthi

Now, that we have seen the difference between security and privacy in our last post, let us see how we can implement security and privacy

Read More
Information security Information Security Privacy

Security vs Privacy

September 10, 2024September 10, 2024 Jayanthi

We might have heard of the terms, security and privacy and might have thought that they might be similar. But are they similar or are

Read More
AI Information security Technology

Which is your favorite post this A2Z?

May 2, 2024May 3, 2024 Jayanthi

As I finally complete my BlogchatterA2Z this year, I want to ask you my readers , which is your favorite technical post on my A2Z

Read More
AI Technology

Prompt Engineering

May 1, 2024May 9, 2024 Jayanthi

‘Prompt Engineering’ is again a new concept with the rise in AI models. It is that job that relates to generating perfect prompts so that

Read More
Information security Privacy

Zero party data!

April 30, 2024April 30, 2024 Jayanthi

In the age of increasing privacy awareness, “Zero party data’ is a whiff of fresh air. Before we dive into Zero party data, let us

Read More
AI Information security Technology

Xtra facts about AI

April 28, 2024April 28, 2024 Jayanthi

We have seen a lot of posts on AI…let us see some other details about AI. In this post we will talk about Strong AI

Read More
AI Information security Machine learning Technology

The Deepfakes

April 24, 2024May 9, 2024 Jayanthi

It is quite difficult to believe anything on the Internet these days. Is the content written on the net written by the author themselves? Is

Read More
Information security Information Security Privacy

Shift Left Privacy

April 23, 2024April 23, 2024 Jayanthi

We have already seen ‘Shift Left Security‘ in another post…now, it is time to discuss ‘Shift Left Privacy’ in this post… Privacy principles don’t stand

Read More
AI Technology

AI Quiz!

April 21, 2024April 21, 2024 Jayanthi

Now that we have seen a few AI posts, let us do a quiz to test our knowledge! 🙂 This post is for alphabet ‘Q’

Read More
AI Information Security Privacy Technology

OpenAI and Privacy

April 20, 2024April 20, 2024 Jayanthi

Now that almost everybody is using ChatGPT or some form of AI in their lives and it is a known fact that all AI models

Read More
AI Information security Technology

Large Language Models

April 15, 2024April 15, 2024 Jayanthi

Ask anybody in the tech domain and they will have a fair idea of what a LLM or Large Language Model. In the ever evolving

Read More
AI Technology

Is your data being kept secure?

April 12, 2024April 12, 2024 Jayanthi

So, you are a content creator generating lots of useful content in the form of videos or blogs? You are happy with your subscriber count

Read More
AI Technology

AI Hallucinations

April 10, 2024April 10, 2024 Jayanthi

No, these are not the hallucinations that one physically experiences in life…these are AI hallucinations… what are they? Let us see more in this post;

Read More
AI Technology

AI Fairness

April 9, 2024April 9, 2024 Jayanthi

Ever since AI has barged onto the scene, we as human beings have insane requests. We want it to draw things that we are envisioning,

Read More
AI Information security Technology

Detecting AI content

April 4, 2024April 4, 2024 Jayanthi

There is nothing to beat the thought of AI today. It seems to be enveloping our life in different types of content creation whether it

Read More
AI Information security Machine learning Technology

AI and CyberSecurity

April 3, 2024April 3, 2024 Jayanthi

There might not be a field in the world that AI has not touched today. Cybersecurity is absolutely no exception here! There are many facets

Read More
AI Technology

Business disruptions caused by AI

April 2, 2024April 2, 2024 Jayanthi

We all know that there are businesses that are affected by the advent of AI. At this point of time, it is no secret whether

Read More
Technology

Artificial Intelligence!

April 1, 2024April 1, 2024 Jayanthi

Have I told you how fleeting technology is? And how fleeting I am as well? 🙂 Technology grows and morphs into new things everyday and

Read More
Information security

BlogchatterA2Z Theme Reveal 2024!

March 26, 2024March 26, 2024 Jayanthi

April comes and my blog becomes happy with increase in traffic and I am happy to write more for the BlogchatterA2Z Challenge !! 🙂 So,

Read More
Information security Technology

Sora

February 16, 2024February 17, 2024 Jayanthi

‘Sora’ is the text to video AI model and it is surely turning eyes and ears! AI is ruling the digital world and it is

Read More
Information Security Privacy

Love your Data! :)

February 14, 2024February 14, 2024 Jayanthi

This Valentine’s day, what else will I the privacy warrior talk about? “Love your data”! 🙂 As the day winds down, here are some simple

Read More
Information Security Privacy

Privacy Engineering

February 13, 2024February 13, 2024 Jayanthi

My latest fascination and my passion seems to be “privacy” now! 🙂 I am always fascinated by some new topic or other and I finally

Read More
Information security Privacy

Data Privacy Day 2024!

January 28, 2024January 28, 2024 Jayanthi

January 28th is celebrated as ‘Data Privacy Day’ every year. This is to bring more awareness to privacy issues that are constantly rising in our

Read More
Information security

Blog Summary 2023

December 31, 2023December 31, 2023 Jayanthi

As the year 2023 comes to close, here is a list of the top five blog posts that you read on my blog this year:

Read More
Information Security Privacy

Instagram Security

October 9, 2023October 9, 2023 Jayanthi

Instagram is “the” app for pictures, videos, reels and much more… 🙂 It is quite trendy for the youth of today and I think almost

Read More
Information security

What is ‘Homomorphic encryption’?

September 10, 2023September 10, 2023 Jayanthi

Cryptography is the art of hiding information in transmit. It ensures that information which is sent by the sender is received as is by the

Read More
Personal

Greatest part of being a technical blogger is..

September 6, 2023September 6, 2023 Jayanthi

Well….what will it be? 🙂 Any guesses? For anybody on the planet that doesn’t know yet – I have been a technical blogger since 2012

Read More
Information security

What is “Shift left Security”?

September 5, 2023January 11, 2024 Jayanthi

“Shift left” is a popular paradigm in application security which refers to “Shift left” security or “Shift left” testing. We will discuss “Shift left security”

Read More
Personal

My Master’s degree story!

September 1, 2023September 1, 2023 Jayanthi

I was again wondering what to write for the next post of BlogchatterHalfMarathon when this idea suddenly sprung by…:) – My Master’s degree story…here goes

Read More
Information security

What is DevSecOps?

August 29, 2023December 31, 2023 Jayanthi

DevSecOps is “development”, “security” and “operations” which is the current and upcoming practice of incorporating security at every phase of the SDLC(software development life cycle)

Read More
Information security

Why do we need Automated Threat Modeling?

August 28, 2023September 10, 2023 Jayanthi

We have already seen what is meant by basic ‘Threat Modeling‘ in an earlier post… let us now see what is meant by Automated Threat

Read More
Information security

What is Threat Modeling?

August 2, 2023August 2, 2023 Jayanthi

While ‘Threat Modeling’ is a vast topic and there are numerous sub-topics which can be discussed, here is brief post about the different aspects of

Read More
Information security Technology

Threads

July 10, 2023July 10, 2023 Jayanthi

There is a new kid on the tech block and no, I think we have crossed the ChatGPT phase.. 🙂 Enter ‘Threads’ from Meta and

Read More
Information security

World Password Day 2023

May 4, 2023May 2, 2024 Jayanthi

‘World Password Day’ is celebrated on May 4th, 2023 and what better way to celebrate it than by following the rules given below to remain

Read More
Information Security Privacy

Whatsapp Privacy

April 26, 2023April 26, 2023 Jayanthi

Whatsapp maybe currently the most used tool online today. I think Whatsapp leads in having conversations with anybody and everybody! 🙂 There are innumerable number

Read More
Information security

Shark Tank India – Season 2!

April 23, 2023April 23, 2023 Jayanthi

How many of us can say we weren’t bitten by the ‘Shark Tank India’ show while it was being aired? I know the current season

Read More
Information security

RSA algorithm

April 21, 2023April 21, 2023 Jayanthi

Cryptography always occupies a special place in my heart as I keep riveting back to to it repeatedly! 🙂 Cryptography is the art of hiding

Read More
Information security

Pytm

April 19, 2023December 7, 2023 Jayanthi

Did you know that there is something called ‘Pytm’ in the technical world? Read that word again – it is ‘Pytm’ and not Paytm! 🙂

Read More
Technology

What is Open Source Software?

April 18, 2023April 18, 2023 Jayanthi

Fundamental coding is not not too hard but a lot of code in massive projects is definitely prone to bugs and flaws. While nobody can

Read More
Information security

InfoSec Jumble!

April 11, 2023April 11, 2023 Jayanthi

After writing a few posts, I thought of perking my blog posts with an InfoSec jumble! See if you can find the words in the

Read More
Technology

Insta gen!

April 10, 2023April 9, 2023 Jayanthi

The teeny bopper generation is something else! They shun Facebook, Whatsapp and older social media platforms. Gen Z is the generation of kids/young adults born

Read More
Information security

Why ‘Doge’?

April 5, 2023April 5, 2023 Jayanthi

If you are active on Twitter – you very well know what the above word means. Twitter’s iconic blue bird logo… Has been replaced like

Read More
Information security

Dangers of AI

April 1, 2023April 1, 2023 Jayanthi

By now, the whole world is chattering about ‘ChatGPT’, Bard and other AI chatbots. AI or ‘Artificial Intelligence’ is the concept that is powering these

Read More
Information security Privacy

ChatGPT and Privacy

February 10, 2023February 10, 2023 Jayanthi

ChatGPT and Privacy: ChatGPT is on everyone’s mind. Unless, you have been living under a rock, it is the latest in the technology that is

Read More
Information security

What is ChatGPT?

January 18, 2023January 20, 2023 Jayanthi

With the whole world inspecting and wondering how ChatGPT works(or how to make it work for them), I had to dive, do my research and

Read More
Information security

Best posts for 2022!

January 1, 2023January 1, 2023 Jayanthi

Even as the Sun has set on the year 2022, here are the best posts for the year 2022 on my blog! Would you like

Read More
Information security Privacy

Whatsapp Privacy Updates 2022

August 10, 2022August 10, 2022 Jayanthi

In an increasingly private world, ‘Meta’ founder Mark Zuckerberg, on Tuesday announced new privacy updates for Whatsapp messenger. They are summarized below and they are

Read More
Information Security Privacy Privacy Technology

Fair Information Practices

August 4, 2022February 7, 2023 Jayanthi

The privacy sector is rapidly evolving and new laws and regulations are constantly coming into effect all across the world to keep personal data safe.

Read More
Information Security Privacy

IMPORTANT INFORMATION SECURITY DATES

May 6, 2022May 6, 2022 Jayanthi

It is quite amazing that cyber security dates have gained prominence in recent days…here are some important cyber security dates for any calendar year: January

Read More
Java Programming

Xtra programs in Java

April 28, 2022April 28, 2022 Jayanthi

Having written a lot of posts on Java for this entire month, what better way to round it off than do a few programs that

Read More
Programming Technology

Wrapper classes in Java

April 27, 2022April 27, 2022 Jayanthi

Java has numerous concepts and features. We have just touched a base on some of them such as Classes, methods, variables, Interfaces, Inheritance and more.

Read More
Technology

Very Twitter! :)

April 26, 2022October 28, 2022 Jayanthi

May be out of all the social media platforms that I truly like is “Twitter”. Why? – because there is no family around.. 😉 😉

Read More
Java Programming Technology

Useful concepts in Java

April 25, 2022April 25, 2022 Jayanthi

We have seen numerous posts on Java this month relating to Classes, methods, Inheritance, Interfaces, Access modifiers, Non-access modifiers , exceptions and more. While many

Read More
Java Programming Technology

Two dimensional arrays

April 24, 2022February 22, 2023 Jayanthi

We have already seen Arrays in an earlier post…to recap, an array is used to store homogenous elements at fixed locations. Two dimensional arrays are

Read More
Java Programming

String Class

April 22, 2022April 22, 2022 Jayanthi

The String Class in Java is one of the important classes in Java. The String Class is considered to be an Object in Java. Strings

Read More
Java Programming Technology

Runtime Exception

April 21, 2022April 22, 2022 Jayanthi

We have already read about ‘Exceptions’ in an earlier post. To recap: Exceptions are certain error conditions which arise in a program. These error conditions

Read More
Java Programming

Java Quiz!

April 20, 2022April 20, 2022 Jayanthi

I have written about 12 posts about Java for this month’s BlogchatterA2Z and what better way to understand it than by doing a short quiz?

Read More
Java Programming

OOP

April 18, 2022April 18, 2022 Jayanthi

Maybe the true sense of studying Java is to understand the various ‘Object oriented programming’ concepts coming into play. Apart from the fundamental definitions of

Read More
Java

Loops and Nested Loops

April 17, 2022April 17, 2022 Jayanthi

After having discussed a lot about arrays, inheritance, interfaces and access and non-access modifiers in Java, there is still one concept of Java that we

Read More
Programming Technology

The ‘abstract’ modifier

April 15, 2022April 15, 2022 Jayanthi

We have already seen the public access modifiers such as private, public, protected and default in an earlier post. We have also seen the ‘final’

Read More
Java Programming

‘this’ keyword in Java

April 13, 2022April 13, 2022 Jayanthi

After barreling through a lot of advanced concepts in Java, here is a another often confused and puzzling one – the ‘this’ keyword…:) Keywords in

Read More
Java Programming

Other Java modifiers

April 12, 2022April 12, 2022 Jayanthi

We have seen the major access Java modifiers such as public, private, protected and default. But did you know that there are other modifiers in

Read More
Java Programming

Inheritance and Interfaces in Java

April 11, 2022September 29, 2023 Jayanthi

We will discuss two important concepts in Java – inheritance and interfaces. ‘Inheritance’: Inheritance as the name suggests is inheriting the class functionality of a

Read More
Java Programming Technology

Homogeneous ‘Array’

April 10, 2022April 10, 2022 Jayanthi

We cannot proceed with the discussion of Java without discussing an important concept and that is of ‘Arrays’. We have already spoken about the different

Read More
Information Security Technology

What is ‘Google Dorking’?

April 8, 2022November 6, 2023 Jayanthi

Most of us think of ‘Google’ only as a search engine. You put in a search phrase in the ‘search box’ and it spits out

Read More
Java Technology

Exceptions

April 6, 2022April 6, 2022 Jayanthi

What happens when there is any problem in our life? We try to fix it…:) similarly, when there is a problem in our Java program

Read More
Java Programming

Declaring Java modifiers

April 5, 2022April 5, 2022 Jayanthi

We have already seen a brief introduction to ‘Java modifiers’ in the ‘Basic Java concepts‘ post. As we have already mentioned, there are four access

Read More
Java

Classes and Constructors

April 4, 2022April 4, 2022 Jayanthi

As already stated, Classes contain the blueprint for an Object. Each Class has variables and methods. One important point before we start exploring more about

Read More
Beginner Java Programming

Basic Java concepts

April 2, 2022April 27, 2022 Jayanthi

Before diving headfirst into Java, here are a few basic Java concepts that one should know. First, we will see the structure of a Java

Read More
Programming Technology

Absolute Java!

April 1, 2022April 1, 2022 Jayanthi

Java was one of the first programming languages that I worked with long ago. It took the world by storm in the year 1995 and

Read More
Java Programming

BlogchatterA2Z Theme Reveal 2022

March 27, 2022March 27, 2022 Jayanthi

I think I did the BlogchatterA2Z challenge in 2018 for the first time and thoroughly enjoyed it that time. Since then, I have been doing

Read More
Technology

Zepto

February 23, 2022February 23, 2022 Jayanthi

Bangalore or Bengaluru is one of the few cities in India that is highly tech driven. We have apps for almost anything and everything. From

Read More
Information security

Wordle hack!

February 17, 2022February 18, 2022 Jayanthi

No sooner had I discovered Wordle about a month back, than I was hooked onto it…I could sit up past midnight normally, and now I

Read More
IIT JEE preparation

My experience with IIT Coaching

February 15, 2022February 15, 2022 Balaganesh Manikandan

No story of any successful IITian is complete without a description of the coaching centre they went to. So, here is a summary of my

Read More
Information security Privacy

IAPP certifications

January 28, 2022April 25, 2022 Jayanthi

Today is January 28th, 2022 and what better day to write about IAPP certifications that today! 🙂 With umpteen number of social media platforms and

Read More
Information security

2021 Year in Review

December 31, 2021December 31, 2021 Jayanthi

With the year 2021  slipping into history, these are some of the posts that I enjoyed writing on my blog this year…  Hope you enjoy

Read More
Best of 2021 Information security

Apache Log4j software vulnerability

December 14, 2021December 30, 2021 Jayanthi

The Internet is ablaze with talk about the Log4j vulnerability. Here are a few details that have been understood about the vulnerability so far:  

Read More
Information security

October – Cybersecurity awareness month

October 8, 2021October 8, 2021 Jayanthi

Did you know that October is cyber security awareness month? 🙂 Yes..it is a month solely dedicated to talk a lot about cybersecurity… 🙂 Here

Read More
Personal

Advantages of writing for my own blog

October 1, 2021October 2, 2021 Jayanthi

Ask anybody who is writing for their own blog and they will say that their life is the best! 🙂 Why? Here are some reasons,

Read More
Best of 2021 Information security

Passwordless authentication

September 28, 2021February 15, 2023 Jayanthi

Passwordless authentication: How many of us are tired of remembering multiple passwords all the time? How many of us are guilty of reusing passwords or

Read More
Personal

Hindi in Tamil Nadu

September 22, 2021October 1, 2021 Jayanthi

Is it existent? 🙂 Yes…it is but you have to look and listen very, very carefully though….:) Let us first analyze how the Indian languages

Read More
Information security

CCPA

September 21, 2021October 17, 2022 Jayanthi

CCPA is ‘California Consumer Privacy Act’ that came into effect in 2018. It is yet another privacy regulation similar to the GDPR. However, CCPA tries

Read More
Personal

IIT-R internships!

September 16, 2021August 28, 2023 Jayanthi

Move over college life…welcome to work life! (atleast an internship) The son sat in his suit all dressed and prim and proper preparing for his

Read More
Information security

Communication skills

August 11, 2021August 11, 2021 Jayanthi

“The art of communication is the language of leadership” – James Humes This quote by James Humes probably summarises the communication skill concept very well.

Read More
Information security

Facebook hack

August 10, 2021December 19, 2021 Jayanthi

Facebook is now an old social media platform. It has personal memories and professional memories for many individuals through the years. Now let us see

Read More
Information security

Scytale Cipher

August 4, 2021March 13, 2023 Jayanthi

Cryptography is yet another domain of the CISSP exam which is exciting and fascinating. I have already written several posts on Cryptography on my blog(Caesar

Read More
Information security

More about Pegasus

August 2, 2021August 3, 2021 Jayanthi

By now, most or all of us might have heard about ‘Pegasus’ the spyware that was used to spy on about 50,000 journalists from all

Read More
Best of 2021 Information security

What is Swisscows?

July 21, 2021October 13, 2022 Jayanthi

Close on the heels of my search for privacy based sites and tools, I stumbled upon Swisscows which is a “data secure” privacy-focused search engine.

Read More
Best of 2021 Java Programming

Competitive Programming: Binary Search

July 8, 2021December 30, 2021 Bala Manikandan

Welcome to another post related to competitive programming! This post is in continuation to my earlier post “Competitive Programming and Time Complexity” which you can

Read More
Personal

Book review: Windows 10 Simplified

June 2, 2021June 20, 2022 Jayanthi

Title : Windows 10 Simplified Author: Anand Narayanaswamy About the author: Anand Narayanaswamy works as a freelance writer and is based inThiruvananthapuram, Kerala. He has

Read More
Best of 2021 Information security

Zero trust security

April 29, 2021December 30, 2021 Jayanthi

With hacks and breaches continuing in spite of all countermeasures, a new type of security model had to be created such that it thwarts further

Read More
Technology

XHTML

April 27, 2021April 27, 2021 Jayanthi

I had written about the differences between HTML and XML in last years Blogchatter’s A2Z ‘X’ post…this year, I am writing about a similar topic

Read More
Information security

VirusTotal

April 25, 2021October 14, 2021 Jayanthi

‘VirusTotal’ is a site that analyses and checks suspicious files and URLs to detect malware. This is then shared with the security community. Here are

Read More
Best of 2021 Information Security Technology

Telegram Security

April 22, 2021December 30, 2021 Jayanthi

With Whatsapp policy updates shaking the online world in January 2021, the whole of my digital world seemed to be moving towards other social media

Read More
Information security

Word Search

April 21, 2021April 21, 2021 Jayanthi

Rather than write another robotic post about my favorite tech posts, here is a ‘Word Search’ that I loved creating… 🙂 with my favorite tech

Read More
Technology

Rust

April 20, 2021December 19, 2021 Jayanthi

There are a number of programming languages like C, C++. Java and the more recent one like Python. ‘Rust’ is another programming language that is

Read More
Technology

A2Z Quiz!

April 19, 2021February 22, 2023 Jayanthi

What better thing to write about for letter ‘Q’ than a ‘Quiz’! 🙂 Here is a simple quiz on the posts that I have written

Read More
Best of 2021 Information Security

Privacy browser – Brave

April 18, 2021December 30, 2021 Jayanthi

Quick on the heels of my previous post which dealt with the ‘Opera’ browser, this post talks about yet another privacy browser called ‘Brave’. As

Read More
Technology

Opera Browser

April 16, 2021January 23, 2023 Jayanthi

Browsing the Internet has come a long way. From Netscape Navigator to Internet Explorer to Google Chrome the browser world has come a long way.

Read More
Technology

Medium

April 14, 2021July 23, 2021 Jayanthi

I was introduced to ‘Medium.com’ by the same person who introduced me to writing! (thank you, it is a fun site! :))Most of my writer

Read More
Technology

My tech learnings over the years

April 13, 2021April 14, 2021 Jayanthi

I have been into programming and tech from the age of 15, thanks be to my father! Initially, I got into it, only because my

Read More
Information security

Jigsaw Puzzle!

April 11, 2021April 11, 2021 Jayanthi

As I was wondering what I should write for alphabet ‘J’ for #BlogchatterA2Z 2021, I hit upon an idea…:) Why not a puzzle to keep

Read More
Best of 2021 Information security Technology

IPv4 address

April 9, 2021December 30, 2021 Jayanthi

‘Internet Protocol’ addressing or ‘IP’ addressing gives each device on the Internet an address and location. The address can be represented in IPv4 format or

Read More
Information security

HIPAA

April 8, 2021December 19, 2021 Jayanthi

Close on the heels of yesterday’s GDPR post, is another post on privacy. This post deals with privacy of health information of individuals. HIPAA or

Read More
Information security

GDPR

April 7, 2021December 19, 2021 Jayanthi

Who has your name? Who has your phone number? Who has your location information? If you are worried about all these questions and more, then

Read More
Best of 2021 Technology

Facebook data breach

April 6, 2021May 5, 2022 Jayanthi

Facebook needs no introduction. It is one of the oldest social media platforms that has spawned several other social media platforms and a social media

Read More
Technology

Clubhouse

April 2, 2021November 3, 2021 Jayanthi

Have you heard about Clubhouse? If you haven’t heard about it, here are a few details about the app which made headlines when Elon Musk

Read More
Automobiles

‘Apple’ Car

March 31, 2021April 1, 2021 Jayanthi

After security and programming, I love cars!! 🙂 I admire the different makes and colors and features of the different cars. I always wonder if

Read More
Information security Technology

One Trust Privacy Professional

March 16, 2021October 10, 2023 Jayanthi

I got the One Trust Privacy Professional certification and am all excited!! 🙂 How do we get it? Professionals who seek to get the One

Read More
Information security Information Security Programming Technology

Best posts for 2020!

January 1, 2021January 1, 2021 Jayanthi

As 2020 has rolled away into oblivion, here are the best posts on my blog according to traffic: Would you like to read them again?

Read More
Machine learning Technology

Machine Learning: Multivariate Linear Regression

December 5, 2020December 5, 2020 Bala Manikandan

Welcome back! In my previous posts on machine learning, I had talked about univariate linear regression, in which a continuous “target” variable was predicted on

Read More
Information security

Tech quiz!

November 16, 2020November 17, 2020 Jayanthi

Here is another quiz that involves technology, blockchain and Information security! Do take it and give me your feedback!

Read More
Technology

Web 3.0

October 29, 2020November 4, 2020 Jayanthi

“Change is the only constant” is a highly popular and true saying that is liberally splashed all around. It is however very true for the

Read More
Technology

Which is your favorite social media platform?

October 28, 2020October 28, 2020 Jayanthi

From the days of writing about ‘social media outcasts‘ to ‘ What is your social media personality‘, I have come a long way. Now, I

Read More
Information security

InfoSec Quiz

October 20, 2020October 21, 2020 Jayanthi

Here is a fun InfoSec Quiz for beginners in Information Security! Have fun doing it! 🙂 This is the sixth post for @Blogchatter’s #MyFriendAlexa

Read More
Technology

Top 3 Google Tricks

October 18, 2020May 14, 2021 Jayanthi

We all know Mr. Google… he helps us through our highs and lows…(hopefully! :)) But there were some amazing things about Google that I came

Read More
Information security

Smart strategy

October 8, 2020October 27, 2020 Jayanthi

Disclaimer: This is not a tech post…but rather about a very tech person and my observations about him/her for a period of time… In 2018,

Read More
Information security

PCI -DSS

October 6, 2020July 23, 2021 Jayanthi

              ‘Security’ as I see it is omnipresent in our lives. We may not have an excessive interest in it or even feel that it

Read More
Information security Technology

Persuasive technology

October 4, 2020October 4, 2020 Jayanthi

Are you a person who cannot be convinced easily? Well, don’t worry – if you are doing most of your work online, somebody has convinced

Read More
Information security

OTP fraud

September 30, 2020October 13, 2023 Jayanthi

In these COVID times, even as humanity is struggling with many things, there are many others who are trying to make quick money. One of

Read More
Machine learning

Machine Learning: Gradient Descent II

August 23, 2020August 26, 2020 Bala Manikandan

Welcome again! This is a continuation of my previous post about gradient descent. In this post, I will talk about the learning rate, and show

Read More
Machine learning

Machine Learning: Gradient Descent I

August 23, 2020August 23, 2020 Bala Manikandan

Welcome back! In the previous post, I had talked about univariate linear regression, and defined the cost function as: Here m denotes the number of

Read More
Machine learning Technology

Machine Learning: Univariate Linear Regression

August 4, 2020August 4, 2020 Bala Manikandan

Welcome back! This is in continuation to my previous post “Machine Learning: Introduction”. In this post I will discuss the problem of univariate linear regression,

Read More
Machine learning Technology

Machine Learning: Introduction

July 11, 2020July 11, 2020 Bala Manikandan

Recently I completed a course on the topic of ‘Machine Learning’, and I would like to share some of the things I learnt from the

Read More
Blockchain Information security

Certified Blockchain Expert

July 4, 2020July 5, 2020 Jayanthi

I recently achieved the ‘Certified Blockchain Expert’ from Blockchain Council and here are some of the details of the exam. After drowning in Information security

Read More
Programming

Competitive Programming and Time complexity

June 10, 2020October 5, 2022 Bala Manikandan

‘Competitive programming’ is nowadays popular among many coding enthusiasts over the world (including me). It is the skill of designing and implementing efficient algorithms (through

Read More
Information security

Zoom 5.0

April 29, 2020April 30, 2020 Jayanthi

What is the most talked about or used app today? It is ‘Zoom’!! With ‘Work from home’, ‘Study from home’, ‘Art from home’, ‘Yoga from

Read More
Information security

Wh(y)?

April 28, 2020April 28, 2020 Jayanthi

From being a total social media outcast, I can safely say I have come a long way! 🙂 I am moderate social media user today

Read More
Technology

XML vs HTML

April 27, 2020April 27, 2020 Jayanthi

HTML and XML have been around for a long time now. Most of us would have heard of HTML. It is there since the beginning

Read More
Information security Technology

Whatsapp hacks!

April 26, 2020April 27, 2020 Jayanthi

Disclaimer: Many of you might be knowing this simple hack, but this write up is just for people who might not know… With the current

Read More
Programming

Remember UNIX?

April 23, 2020April 24, 2020 Jayanthi

With most of the world rolling in Windows and Linux, chances are you would have heard of the ‘UNIX’ operating system only in print. I

Read More
Information security

Top 5 Security news snippets

April 22, 2020April 22, 2020 Jayanthi

Is the job of an Information security professional a recession proof job? Even in these COVID times, an Information security professional seems to have their

Read More
Information security

How different is the ‘Maze’ ransomware?

April 20, 2020April 21, 2020 Jayanthi

The world and its citizens might be fixated on the Coronovirus and its effects, but there are malicious people doing their online nefarious activities as

Read More
Information security

Phishing vs Spear phishing

April 17, 2020April 17, 2020 Jayanthi

‘Phishing’, ‘Spear phishing’ are some common hacks in the Information security domain. While ‘Phishing’ scam is something that many of us might have heard about

Read More
Information Security

Buffer overflow vulnerability

April 17, 2020April 17, 2020 Jayanthi

I moved into the Information security domain after having worked with many programming languages. I have worked with dinosaur programming languages like BASIC, FORTRAN, C,

Read More
Technology

Machine Learning vs AI

April 14, 2020April 15, 2020 Jayanthi

In the tech world, ‘Machine Learning’ and ‘Artificial intelligence’ or AI have been buzzwords for quite a while now. Let us see a brief overview

Read More
Information Security

Known Plaintext attack vs Chosen plaintext attack

April 12, 2020October 16, 2024 Jayanthi

I had already blogged about ‘Cryptography’ in a post long ago…to recap: Even though different cryptographic algorithms are created for secure communication between the sender

Read More
Programming

Java vs Python

April 10, 2020April 11, 2020 Bala Manikandan

A couple of years back, Java was considered one of the most popular programming languages, but recently Python has also gained popularity as well. As

Read More
Management

Habit 7: Sharpen the Saw

April 8, 2020April 8, 2020 Mani Prithiviraj

In this article, we will look at the final habit, which is “Sharpen the Saw”. Habit 7 surrounds the other six habits and is the

Read More
Information security

Adam Gordon vs Shon Harris

April 7, 2020April 7, 2020 Jayanthi

This post might be particularly more understandable to those in the Information security domain and the certification aspirants! 🙂 Shon Harris: Shon Harris is the

Read More
Information security

Cloud firewall vs Hardware firewall

April 6, 2020April 6, 2020 Jayanthi

I had already blogged about firewalls in an earlier post….to refresh one’s memory, a firewall is a hardware or software product that stands between the

Read More
Information security

End point security vs Network Security

April 5, 2020April 5, 2020 Jayanthi

There are several different types of security in the information security field. After all, it is not easy to protect each type of device without

Read More
Information security

Due Care vs Due Diligence

April 3, 2020July 1, 2021 Jayanthi

‘Due Care’ and ‘Due Diligence’ are two concepts that might be more prevalent in the legal system but are also present in the Information security

Read More
Information security

Clark Wilson Model vs Bell-LaPadula Model

April 2, 2020January 7, 2021 Jayanthi

The ‘Clark Wilson Model’ and the ‘Bell-LaPadula’ models are two examples of security models. Security models were created to implement the ‘Security policies‘. Recall, from

Read More
Information security

Business continuity vs Disaster recovery

April 1, 2020April 1, 2020 Jayanthi

There is no better time to learn about the terms “Business Continuity” and “Disaster recovery” than in these COVID times. It is also easier to

Read More
Information security

Authentication vs Authorization

March 31, 2020March 31, 2020 Jayanthi

Another April has come and it means another Blogchatter challenge! 🙂 I will be doing this year’s Blogchatter challenge on ‘Comparison posts’ … read my

Read More
Management

Habit 6: Synergize

March 10, 2020October 25, 2021 Mani Prithiviraj

In this article, we will look at the next habit which is “Synergize”. Practice and Perfection of the first 5 habits is a pre-requisite for

Read More
Management

Habit 5: Seek First to Understand, Then to be Understood

February 24, 2020October 25, 2021 Mani Prithiviraj

In the previous article we looked at the 4th Habit, which is “Think Win Win”, which is to seek mutual benefit in all our interactions.

Read More
Beginner Information Security

How do I know if I have been hacked?

February 20, 2020February 21, 2020 Jayanthi

Even as the posts on my blog are mostly related to the technical aspects of Information security, here is a post that deals with the

Read More
Bitcoin Blockchain Information security

Exploring the Impossibility of Full Decentralization

February 10, 2020February 10, 2020 Albaron Ventures

This article is originally published in Albaron Ventures. In our quest to escape from existing corrupt centralized systems, we may believe that it’s possible to achieve complete decentralization.

Read More
Information security

Password Hygiene

February 6, 2020February 10, 2023 Jayanthi

Here are a few tips to maintain a good password hygiene:

Read More
Information security Technology

Google Envelope

January 28, 2020January 28, 2020 Jayanthi

Technology never ceases to amaze us, right? Just 5- 6 years back or maybe a decade back, we were trying to push every possible activity

Read More
Information security

QR code scam

January 16, 2020January 16, 2020 Jayanthi

Have you seen a small rectangular box filled with black designs in newspapers, movie tickets and shopping places(Paytm, PhonePe, UPI)? This is a QR code.

Read More
Management

Habit 4: Think Win Win

December 29, 2019October 25, 2021 Mani Prithiviraj

In the previous article we looked at the 3rd Habit, which is “Put First Things First”. It can be summarized as “Prioritize the Important Tasks”.

Read More
Information security

Capture the Flag (CTF) in Cyber Security

December 28, 2019December 28, 2019 Bala Manikandan

Capture the Flag, or CTF, refers to an information security competition in which contestants solve various tasks such as exploiting a webpage, reverse engineering some

Read More
Bitcoin

Will Bitcoin Ever Be Regulated?

December 26, 2019January 17, 2020 Albaron Ventures

This article is originally published in Albaron Ventures. As Bitcoin and other digital assets continue to grow in adoption and popularity, a common topic for

Read More
General

Update…

December 22, 2019December 24, 2019 Jayanthi

I have moved my hosting and am in the process of moving my content….please check back on Friday – the 27th of December 2019… Thanks

Read More
Beginner

Mastodon

November 11, 2019November 9, 2022 Jayanthi

It seems as though something new is always brewing on the technological front!  I have been hearing about “Mastodon” for quite a while and sought

Read More
Management

Habit 3: Put First Things First

November 10, 2019October 25, 2021 Mani Prithiviraj

In the previous article we looked at the second habit, which is “Begin with the End in Mind”. The first habit (“Be Proactive”), says that

Read More
Management

Habit 2: Begin With the End in Mind

September 27, 2019October 25, 2021 Mani Prithiviraj

In article one and article two, we reviewed Covey’s 7 Habits of Effective people and the First Habit (Be Proactive). We understood how alignment of

Read More
Information Security Medium

Popular Information security tools

September 25, 2019October 16, 2020 Jayanthi

Can you imagine peeping into your network and seeing the traffic come in and go see the applications on the net that are trying to

Read More
Beginner Information Security

iOS 13 privacy

September 22, 2019 Jayanthi

With Apple releasing the new iPhone 11 and its 13th major release of its mobile operating system, ‘iOS 13 on September 19, 2019’, it is

Read More
Beginner Information Security

Certifications vs Degree

September 19, 2019 Jayanthi

‘Certifications’? Ask this to any computer professional – and their eyes will surely glow… 🙂 ‘certifications’ are available in every computer field – as an

Read More
Beginner Information Security

ATM hacking

September 12, 2019March 2, 2020 Jayanthi

Cars can be hacked, phones can be hacked, all smart devices can be hacked – so why not ATM machines? Scary isn’t it? This news

Read More
Management

7 Habits of Highly Effective People

September 6, 2019October 25, 2021 Manikandan Prithiviraj

The 7 habits of highly effective people is a compilation by Stephen Covey of age old natural principles. Examples of natural principles are fairness, integrity,

Read More
Beginner Information Security

AI and Cyber security

September 2, 2019 Jayanthi

“Artificial intelligence” or “AI” is a word that has been generously splashed all over and is omnipresent in our lives today and yet most of

Read More
Beginner Information Security

Face app

July 19, 2019 Jayanthi

It seems the online world is embroiled in some sort of controversy or the other giving me plenty to write about!! 😉 Jokes aside –

Read More
Beginner Information Security

Are you a "Cyberchrondriac?" or a "Script kiddie?"

July 8, 2019 Jayanthi

Cyberchrondriac: I am sure most of us have heard of the term “hyperchrondriac”. A “hyperchrondriac” is a person who is excessively worried about their health

Read More
Beginner Java

ArrayLists: Dynamic Arrays in Java (Part 2)

July 5, 2019 Bala Manikandan

Here is the second post on ArrayLists which is a continuation from part 1 . Here are some points covered in the first part: Main

Read More
Java

ArrayLists: Dynamic Arrays in Java (Part 1)

July 2, 2019 Bala Manikandan

Before beginning this post, I would like to state that this post assumes some prior knowledge of Java (particularly arrays, classes and objects, and overriding)

Read More
Beginner Information Security

'Sharenting'

June 11, 2019 Jayanthi

‘Sharenting’ – “What is that?” might be the thought for many of us…it was the same thought for me too and soon I was researching

Read More
Java Programming Technology

Anonymous Inner Classes and Lambda Expressions in Java

June 6, 2019 Bala Manikandan

Before beginning this post, I would like to state that this post assumes some prior knowledge of Java (particularly inheritance, using interfaces and overriding methods)

Read More
Beginner Information Security

Offensive and defensive security

June 2, 2019June 27, 2020 Jayanthi

Did you know that the words ‘offensive’ and ‘defensive’ can be used in the InfoSec domain as well? If you follow my writings on Information

Read More
Beginner Information Security

Careers in Information security

May 23, 2019 Jayanthi

The ‘Information security’ domain is growing by leaps and bounds today. While it was in a negligible state of growth even 5 years back, it

Read More
Information Security

Project Zero

April 30, 2019 Jayanthi

Security has become an important component of every business. Many(if not all) organizations are choosing a proactive approach to security rather than a reactive one.

Read More
Beginner

YouTube security

April 29, 2019August 28, 2020 Jayanthi

There must not be a soul in this planet who has not watched YouTube videos in this age! From small babies to older adults we

Read More
Beginner Information Security

Women in Cybersecurity

April 26, 2019 Jayanthi

A little girl always fiddled with her mother’s smartphone and tried to crack the passcode or the pattern on it. She knew exactly what her

Read More
Information Security

Two factor authentication

April 23, 2019October 2, 2020 Jayanthi

Recall the ‘Authentication‘ post ? Now we deal with two-factor authentication which is an extension to that post.  Authentication in the information security realm is

Read More
Beginner Information Security Technology

SOC

April 22, 2019February 15, 2020 Jayanthi

‘SOC’ is the acronym for ‘Security Operations Center’. The 2018 Verizon DBIR (Data breach investigations report) states that there were 53,308 security incidents and there

Read More
Beginner Information Security

Red Team – Blue Team

April 20, 2019 Jayanthi

“Red team – Blue team” is a popular parlance in the Information security domain. It actually imitates military tactics, ” red teams” and “blue teams”

Read More
Information Security

Is "Privacy" a myth?

April 18, 2019 Jayanthi

“Privacy”, what? might be a common reaction for some of us. For me, of late, I have been getting more and more passionate about privacy

Read More
Beginner Information Security

OWASP Top 10 vulnerabilities

April 17, 2019December 8, 2022 Jayanthi

OWASP( ‘Open web application security project’) is a community and it is a non-profit organization that is primarily oriented towards securing software. Any type of

Read More
Beginner Information Security

Identity management

April 15, 2019 Jayanthi

‘Identity management’ in some ways is an extension of the concepts of  access control and authentication. The current business environment is complex and getting more

Read More
Information Security

Identity chaos

April 10, 2019 Jayanthi

As I was toying with my next topic for my technical post in Information security, I bumped into this concept called ‘Identity chaos’ – my

Read More
Information Security

Digital forensics

April 4, 2019 Jayanthi

Forensics is identifying, investigating and collecting evidence in a scene of crime. The information collected is then used for legal purposes. We extend this to

Read More
Beginner

Cyber-bullying

April 3, 2019 Jayanthi

The Internet and social media have a very powerful grip on most of us today. Bill payment, shopping, connecting via social media, chatting, gaming – 

Read More
Beginner Information Security

Authentication

April 1, 2019October 20, 2020 Jayanthi

We all have a life outside Facebook, Whatsapp, and Twitter – but we have forgotten the password for it’! 🙂 goes the latest security quote

Read More
Information Security Medium

Kerberos Authentication protocol

March 9, 2019February 28, 2020 Jayanthi

We have already discussed about Cryptography and Caesar cipher‘. In this post we will explore more about Cryptography by discussing the application of Cryptography –

Read More
Beginner Information Security

Network and System Security

February 22, 2019 Bala Manikandan

Network and System Security means protecting your system from different kinds of attacks by unauthorized users. With the development of the Internet and the World

Read More
Bitcoins Blockchain Information Security Technology

What is Cryptojacking?

February 6, 2019 Jayanthi

It just feels like we hear something new about  cryptocurrencies everyday, but let us delve into the concept of ‘Cryptojacking’ in this post.  Having blogged

Read More
Automobiles Technology

Tesla

January 22, 2019September 13, 2021 Mani Prithiviraj

Tesla’s Role in Evolution of Electric Cars Modern day private and public transportation are primarily based on non-renewable energy resources.  These traditional forms of transportation

Read More
Beginner Blockchain Technology

What is 'Steemit'?

January 9, 2019 Jayanthi

Do blogging/writing and blockchain have anything in common? Yes – with ”Steemit’. What is ‘Steemit’? It is a blockchain based blogging platform. Imagine writing a

Read More
Blockchain Technology

The Challenges of Cloud Computing and How Blockchain Can Help

December 18, 2018 Sarah Rothrie

The challenges of cloud computing are easily overshadowed by the fact that the market is going through a huge boom right now. The cloud computing

Read More
Beginner Information Security

Physical security

December 8, 2018November 3, 2021 Jayanthi

‘Physical security’ is an often overlooked aspect of the security. It is often ‘taken for granted’ and most organizations do not take it seriously. Danny

Read More
Technology

What Is Cloud Computing? | The Basics of Digital Outsourcing

November 27, 2018 Marshall Taylor

Cloud computing: the synergistic boardroom buzzword that you still pretend know about. Luckily, it’s a pretty simple idea, technically demanding, but simple none-the-less. On paper,

Read More
Beginner Technology

Tracking

November 16, 2018 Jayanthi

As our dependence on electronic devices increases, from ordering food to paying bills and hailing cab services and making use of online maps to travel

Read More
Blockchain Technology

Can Blockchain prevent another economic crash?

November 3, 2018 Jayanthi

Like any other system, the global economy is susceptible to failure at many different points. Unfortunately, due to the interconnectedness of the world, an economic

Read More
Beginner Information Security

Access control

October 29, 2018October 29, 2020 Jayanthi

It is a reality that the cyber security landscape is rapidly changing everyday. New threats emerge constantly and what was true 5 years ago might

Read More
Beginner Information Security

Single sign on

October 3, 2018November 11, 2020 Jayanthi

In the wake of the Facebook data breach(Source: https://www.wired.com/story/facebook-security-breach-50-million-accounts/) that supposedly compromised 50 million accounts and other personal data last week,  it is but imperative

Read More
Beginner Information Security

Minimum online presence

September 27, 2018September 28, 2020 Jayanthi

No sooner had I written about maintaining a ‘minimum online presence’ on my Hacking post, I had several comments relating to that(either, ‘it was not

Read More
Beginner Information Security

Black Widow

September 18, 2018 Jayanthi

The Information security world is a deep one and sometimes it is quite shocking to know the things that can be done. Did you know that

Read More
Beginner Information Security

Pharming

September 14, 2018 Jayanthi

The online world unfortunately is not a fun place as it seems. There are other types of people around too seeking to grab credit card

Read More
Beginner Information Security

Hacking

September 6, 2018February 20, 2020 Jayanthi

While ‘Information security’ always gives us images of breaches, hacks, stolen credit card numbers and bank account numbers, my blog has always been associated with

Read More
Blockchain Technology

Introduction to Ethereum

August 27, 2018 Jayanthi

Just like Bitcoin, which is highly known, ‘Ethereum’ is yet another open source implementation of the Blockchain concept. However, the similarity between ‘Ethereum’ and ‘Bitcoin’

Read More
Beginner Blockchain Technology

What are Smart Contracts?

August 6, 2018 Jayanthi

‘Smart Contracts’ is a term that is often used in the Blockchain world. ‘Smart Contracts are similar to legal contracts but are encoded in the

Read More
Beginner Information Security

Wireshark

July 17, 2018October 16, 2020 Jayanthi

For those who would like to look deep into their networks and not just on the outside, “Wireshark – the network protocol analyzer,” is the

Read More
Blockchain Technology

What is 'Ripple'?

June 29, 2018 Jayanthi

‘Ripple’ may be a totally unknown term to you or you know exactly what I am talking about – either way ‘Ripple’ is creating ripples!

Read More
Beginner Blockchain

Blockchain lingo!

June 15, 2018July 15, 2020 Jayanthi

Blockchain, AI and machine learning are the latest buzzwords in the IT industry. Building a blockchain is also becoming a need for various businesses. Recall,

Read More
Personal

My new e-book on Amazon Kindle!! :)

May 24, 2018 Jayanthi

My e-book on my personal experiences travelling from India to US and back has been published!! 🙂 Buy it from Amazon today to read about

Read More
Beginner Information Security

Cryptography

May 18, 2018July 7, 2020 Jayanthi

After having done numerous posts on Information security, here is another basic and elementary concept in Information security – ‘Cryptography’. The concept of Cryptography also

Read More
Personal

Reflections on the BlogchatterA2Z journey…

May 3, 2018 Jayanthi

It was the month of March. There were cues for the BlogchatterA2Z challenge all around social media. I was suddenly tempted to participate – should

Read More
Marketing

Marketing automation

May 2, 2018 Radhika Mohan Singh Roy

“Marketing Automation replaces separate systems for email, web visitor tracking, lead scoring, nurture campaigns, campaign management and reporting with one solution that streamlines marketing processes

Read More
Information Security

What are Zombie systems?

April 30, 2018 Jayanthi

In the Information security realm, there are different types of attacks occurring all over the world. There are virus attacks, phishing, worm attacks, DOS  and

Read More
Personal

Yoga – the panacea for all ills?

April 28, 2018May 11, 2022 Jayanthi

The twenties never seem to last forever.  Body aches and lifestyle diseases catch up with us sooner than later. Exercise seems to be the only

Read More
Beginner Java

XOR operator in Java

April 27, 2018 Jayanthi

In the Java programming language, a ‘variable’ is used to store a value. Different kinds of operations can be performed on the variables by means

Read More
Personal

Why do parents name their children after Gods? (mostly Indian parents as I have understood it)

April 26, 2018July 28, 2021 Jayanthi

Whether you are from the North, South, East or Western regions of India – there is a similar pattern that parents follow for naming their

Read More
Beginner Information Security

VPN(Virtual private network)

April 25, 2018 Jayanthi

VPN or ‘Virtual Private network’ is exactly what it states – it is a private and virtual connection to your corporate network. While it is

Read More
Information Security

Usage of Information security

April 24, 2018October 20, 2021 Jayanthi

‘Information security’ in the broadest sense is the protection of information and assets from malicious elements. Individuals and organizations are both subjected to virus, ransomware,

Read More
Personal

Time

April 23, 2018March 13, 2023 Jayanthi

What if we go back in ‘time’? What if we could freeze the current happy “time”? What will be our life like 5 years or

Read More
Information Security

Security

April 21, 2018 Jayanthi

Social media and privacy concerns go hand in hand. On the one hand, we love the reach of sharing our day to day moments, our

Read More
Personal

For the love of 'Reading'…

April 20, 2018 Jayanthi

As I was pondering what to write for alphabet ‘R’ for my Blogchatter A2Z challenge, a recent conversation in my school Whatsapp groups – triggered

Read More
Personal

Quiet

April 19, 2018August 14, 2020 Jayanthi

There were kids playing in the house. There were many others playing outside too. There were screams, yells, laughs and roars. But he found a

Read More
Personal

Palm tree fruit

April 18, 2018February 6, 2023 Jayanthi

Have you seen a small jelly like fruit sold by street vendors with a delicious taste? This is the  ‘Palm fruit’, Palm tree fruit’ or

Read More
Beginner Java

Object oriented programming

April 17, 2018April 18, 2022 Jayanthi

‘Object oriented programming’ is a type of programming which involves object oriented principles like encapsulation, polymorphism and inheritance. These principles are implemented by means of

Read More
Information Security

NIST publications

April 16, 2018 Jayanthi

NIST stands for ‘National Institute of Standards and Technology’ and the NIST special (SP) publications act as a reference for organizations, academic institutions and government

Read More
Beginner Information Security

List of Information security certifications

April 13, 2018October 8, 2021 Jayanthi

‘Information security’ briefly is that branch of study that deals with securing data and identifying weaknesses in systems and sealing them. Anti-virus software, firewalls are

Read More
Personal

'Kulambu'

April 12, 2018 Jayanthi

‘Kulambu’, ‘Kozhumbhu’ or ‘Kolambu’ is a delicious South Indian gravy with the correct amount of tanginess and spice.  While I never do a cooking post

Read More
Beginner Java

Java 101

April 11, 2018 Jayanthi

‘Java’ the object oriented programming language was developed by James Gosling of Sun Microsystems(now a part of Oracle) in 1995. It is a platform independent

Read More
Personal

India!

April 10, 2018 Jayanthi

The pitter-patter of rain drops. Seeing water in liquid form throughout the year. The sight of frogs jumping around. Seeing a double rainbow in the

Read More
Beginner

Hyperledger Composer

April 9, 2018 Jayanthi

Even as the Block chain technology is in its nascent stages and everybody is trying to understand it – there are organizations which have started

Read More
Beginner

Go Green!!

April 7, 2018 Jayanthi

Even as we grumble about the different types of pollution, is is quite ironic to note that “we” are the cause of the pollution! We

Read More
Beginner

Four concepts of Blockchain

April 6, 2018May 12, 2022 Jayanthi

Blockchain, the technology disrupter and the decentralized shared ledger has four important points that essentially define it. They are: Consensus, Immutability, Finality, Provenance. This blog post

Read More
Personal

Empowering women

April 5, 2018February 10, 2022 Jayanthi

In a world, where girls play second fiddle to boys and boys are always the wanted “gender” – it is crucial to empower the girls.

Read More
Beginner Information Security

Caesar Cipher

April 3, 2018August 4, 2021 Jayanthi

But before we see what is Caesar cipher, let us have a brief understanding of Cryptography.From time immemorial, we are trying to make sure that

Read More
Beginner

What is Blockchain?

April 2, 2018December 28, 2020 Jayanthi

We have all encountered ledgers in our lives. We have our own personal ledgers for keeping track of transactions. But when the number of transactions

Read More
Beginner

Asset

April 1, 2018May 12, 2022 Jayanthi

The Blogchatter A to Z has kicked off and I start off my set of posts primarily around the theme of technical and personal posts.

Read More
Beginner

Blockchain trainings!

March 27, 2018 Jayanthi

Technology is a fickle thing. The requirements change at the speed of light!(not exactly – but fast enough! :))  No sooner do we think that

Read More
Personal

A to Z Theme Reveal with Blogchatter!

March 21, 2018 Jayanthi

This year I will be participating in my first ever ‘A to Z BlogChatter Challenge’. The challenge here is to blog everyday for the 26

Read More
Beginner Information Security

2018 Cybersecurity Trends

March 15, 2018 Jayanthi

We are already far into the New year and with it are coming new developments in cybersecurity. 2017 was an exciting year for the cybersecurity

Read More
Java

Overloading and Overriding Methods in Java

March 8, 2018April 12, 2022 Bala Manikandan

Two terms commonly associated with methods in Java are overloading and overriding. These two concepts will be discussed in the following sections. Method Overloading Method

Read More
Automobiles

Future Trends in Automobiles

February 27, 2018February 23, 2023 Mani Prithiviraj

Automobiles have evolved rapidly in the last 30-40 years. This article reviews future trends of Automobiles. As we survey the current landscape of the automotive

Read More
Beginner Information Security

Use cases of Blockchain

February 22, 2018July 4, 2020 Jayanthi

Even as the concept of ‘Blockchain’ is bouncing off everyone’s radar and everyone is keen to know more about this trending topic – let us

Read More
Personal

Video or Text?

February 12, 2018 Jayanthi

I am sure this question might have appeared in other forums – but after writing innumerable blog posts, I am always curious as to what

Read More
Beginner Information Security

What is Information security?

February 8, 2018 Jayanthi

After having dealt with a huge number of posts on Information security, I thought I will answer one of the fundamental questions about Information security

Read More
Beginner Information Security

Social engineering

January 29, 2018October 16, 2023 Jayanthi

Introduction:” 22 bank accounts hacked, ₹5.3 lakh stolen in 48 hours” scream the headlines in a local newspaper (Source: http://www.thehindu.com/news/cities/bangalore/22-bank-accounts-hacked-53-lakh-stolen-in-48-hours/article22538891.ece)How did it happen? Two customers

Read More
Beginner Information Security

Security policies

January 19, 2018March 29, 2020 Jayanthi

‘Security policies’ are yet another aspect of Information security that is all around us – but we are hardly aware of it. We will see

Read More
Beginner Information Security

Biometrics

January 14, 2018January 14, 2020 Jayanthi

‘Biometrics’ is gaining more recognition in today’s world – thanks be to popular organizations embracing it. What is ‘Biometrics’ and what are the different types

Read More
Beginner Information Security

Security trends for 2018!

January 5, 2018 Jayanthi

With the New Year upon us, it is but natural to write about my thoughts on the security trends that might shape 2018! 🙂 So,

Read More
Design Technology

Role of Computer Simulations in Design

December 31, 2017 Mani Prithiviraj

  Introduction – reasons for good design: When we buy a new car, we may have a number of expectations. e.g. We would like the

Read More
Personal

Digital Detox

December 23, 2017January 28, 2020 Jayanthi

With most of us(or is it ‘all’ of us?!) being being plugged onto electronic devices like cell phones, laptops, tablets, IPads all the time, it

Read More
Beginner

Best technical posts of 2017!

December 18, 2017 Jayanthi

As the year draws to a close, here are my best technical posts of 2017: Bitcoin and Blockchain: What next? 2. Cyber diplomacy: 3. What

Read More
Beginner Information Security

Bitcoin and Blockchain: What next?

December 11, 2017May 13, 2022 Jayanthi

It seems every other day has a new headline regarding ‘Bitcoins’. I am sure most of us give a casual glance at this word and

Read More
Beginner Information Security

Definition of the day: What is malware?

December 5, 2017October 8, 2021 Jayanthi

‘Malware’ is  short form for ‘malicious software’. ‘Malware’ encompasses viruses, worms, Trojan horse, ransomware etc Examples of malware include: Wannacry ransomware Destruction produced by malware:

Read More
Personal

What is your social media personality?

December 4, 2017October 27, 2020 Jayanthi

  With social media becoming a permanent feature of most of our lives, it has been  fun to observe the social media personalities of my

Read More
Beginner Information Security

What is the CISSP certification?

November 23, 2017April 7, 2020 Jayanthi

No sooner do we start looking for jobs in the InfoSec industry, we encounter the question “Do you have any certifications?” This post will delve

Read More
Beginner Technology

Did you know?

November 1, 2017 Jayanthi

‘Whatsapp’  is India’s largest and most convenient chat app. The anonymity to send messages without the whole world to view it and the instantaneous way

Read More
Personal

Missing India?

October 24, 2017October 18, 2023 Jayanthi

I write and write about Indian and US life and I never get tired! 🙂 Here is one more… Most of us who move to

Read More
Beginner Information Security

What is Zero day vulnerability?

October 18, 2017October 16, 2020 Jayanthi
Read More
Personal

School education in India and US

October 11, 2017December 23, 2023 Jayanthi

When we moved to India, 7 years ago – the first thing that stumped me when we were looking for our kid’s admissions,  were the

Read More
Beginner

Definition of the day: Trojan virus

October 9, 2017 Jayanthi

The more connected we are with our tablets, mobiles, desktops, laptops, the more we are susceptible to an attack. The connected world boasts of different

Read More
DMZ Firewalls Medium

DMZ

February 15, 2017June 28, 2020 Jayanthi

Introduction: Ignorance may make us think that the Internet is a safe place – but the unseen forces that rule the Internet(such as hackers and

Read More
Personal

It is not what you say, it is how you say it…

September 11, 2024September 18, 2024 Jayanthi

I always tell my kids to speak nicely and sweetly(not that either of them speak loudly or behave aggressively) but still maybe one of the

Read More
Personal

The profession with no retirement…

September 11, 2024September 11, 2024 Jayanthi

All professions have a retirement. Be it a doctor, engineer, lawyer, coder, developer, privacy analyst, infosec practitioner, trainer – all of them have retirement. Sometimes,

Read More

Posts pagination

1 2 … 140 Next
Buy my book from Amazon or Notionpress!

Recent Posts

  • The AI Puppet master!
  • It is not what you say, it is how you say it…
  • The profession with no retirement…
  • How many months of notice period is a good time?
  • Peer pressure

Recent Comments

  • Jayanthi on IIT-R PHOTOBOOK!
  • Jayanthi on The AI Puppet master!
  • Aishwariya Laxmi on The AI Puppet master!
  • Pandian Ramaiah on The AI Puppet master!
  • Pandian Ramaiah on IIT-R PHOTOBOOK!

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
All Rights Reserved 2024.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.