Category Archives: iSecure

Deeper dive to Methods of Hacking

In the previous article, we have discussed about the basics of ethical hacking. In the current one, we will dive little deeper into different methods used for the purpose of hacking. Recalling once again, I should state that hackers are the persons who have deeper knowledge of programming languages, operating system, and networking concepts. Not


Shadow IT

Shadow IT, once confined to unapproved macros in MS Excel has now grown exponentially over the years becoming a major part of IT firms and introducing new security risks arising from unsupported hardware or software. What is Shadow IT? It is any hardware or software inside the organisation which hasn’t yet been approved by the