Mansoor AhmedWhy IS Auditor requires.?During one of my audits, a clients HR department inquires “why do I need IT organogram and IT Job Descriptions” ?Apr 23Apr 23
Mansoor AhmedDon’t Get Confused: Security Operations Centers (SOC) vs. SOC 1 & SOC 2 AuditsFor organizations navigating the complex world of cybersecurity, acronyms like SOC, SOC 1, and SOC 2 can be a source of confusion. While…Mar 9Mar 9
Mansoor AhmedDon’t Get Confused: Disaster Recovery Sites vs. Backups and Their TestingFor IT auditors, ensuring an organization’s preparedness for disaster is paramount. Two crucial elements often misunderstood are backups…Mar 8Mar 8
Mansoor AhmedCyber Kill ChainI’d want to share my expertise on the Cyber Kill Chain as a cyber security specialist. It is a framework that describes how intruders…Jan 9Jan 9
Mansoor AhmedITACIT Application Controls Testing is a process that ensures that the application controls are working as intended. It is essential for…Jan 4Jan 4
Mansoor AhmedITGCAs an IT auditor, I have come across various IT General Controls (ITGC) that are essential for ensuring the confidentiality, integrity, and…Jan 3Jan 3
Mansoor AhmedBlockchain Transactions?A blockchain transaction is a digital asset transfer from one person to another. It is recorded on a blockchain, which is a distributed…Jan 2Jan 2
Mansoor AhmedNext Gen DatabasesCompared to traditional databases, next-generation databases offer greater scalability, performance, and flexibility and are built to…Jan 1Jan 1
Mansoor AhmedMost Common Cyber attacksIn today’s interconnected digital landscape, the prevalence of cyberattacks has become a ubiquitous concern for individuals, businesses…Dec 31, 2023Dec 31, 2023
Mansoor AhmedWhat is SNORTSnort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define…Dec 31, 2023Dec 31, 2023