Info Center

Image
Worldwide BSOD error due to new update in Crowdstrike Falcon Sensor.....

The root cause of the current Microsoft outage has been linked to a recent update from CrowdStrike....

  • Jul 25, 2024
Image
The changes in ISO 27001:2013 to ISO 27001:2022 in nutshell...

Information security, cybersecurity and privacy protection — Information security management systems — Requirements ...

  • Jul 23, 2024
Image
Network Asset Security Management System (NASMS)

Wissen Baum Software Solutions is leading company in Cyber security area, with ISO 27001:2013 Compliance.

  • Jul 23, 2024
Image
Key Solutions for Data Loss Prevention

At Wissen Baum DLP solutions to secure data across Endpoints, Networks, and Cloud environments with Policy, Pepole, and Processes...

  • Apr 30, 2024
Image
ISO 27001:2022. What has changed?

In the digital age, protecting sensitive and confidential information has become more critical than ever before ...

  • Jan 10, 2024
Image
NASMS alignment with RBI-UCBs Cybersecurity Guidelines

Roadmap to achieve Comprehensive Cyber Security Framework for Urban Cooperative Banks (UCB's) alignment with NASMS

  • May 04, 2023
Image
NASMS alignment with RBI-RCBs Cybersecurity Guidelines

Roadmap to achieve Comprehensive Cyber Security Framework for Rural Cooperative Banks (RCB's) alignment with NASMS

  • April 26, 2023
Image
Log4jShell

In the year 2021 log4j will emerge as a critical security challenge for global industry.

  • Jan 31, 2022
Image
Approch to a Customized Network Traffic Analysis (NTA) Tools

Network Traffic Analysis in short “NTA” is a name coined by GARTNER. In this Technology driven world the industries have ...

  • Jan 18, 2021
Image
Global Approach

Network Traffic Analysis as one of the Top Technologies for Security in 2017.

  • Jul 5, 2021
Image
Metasploit Wrap-Up

which allow JNDI features used in configuration, log messages, and parameters, do not protect against attacker controlled LDAP and other JNDI related endpoints ...

  • Dec 17, 2021
Image
The Everyperson’s Guide to Log4jShell (CVE-2021-44228)

If you work in security, the chances are that you have spent the last several days urgently responding to the Log4jShell ...

  • Dec 17, 2021
Image
How to Protect Your Applications Against Log4jShell With tCell

By now, we’re sure you’re familiar with all things Log4jShell – but we want to make sure we ...

  • Dec 17, 2021
Image
Test for Log4jShell With Insight AppSec Using New Functionality

We can all agree at this point that the Log4jShell vulnerability (CVE-2021-44228) can rightfully be categorized as a celebrity vulnerability ...

  • Dec 22, 2021
Image
Gartner Top Technologies for Security in 2017

How EDR, remote browsers, and cloud ...

  • Jul 5, 2017