In the growing economy and the era of storing huge chunks of data, Amazon Web Services (AWS) has become one of the most outgrown cloud computing platforms equipped by many companies all over the globe. Serverless is the future of Cloud Computing. Amazon Web Services does not just offer services for computation, virtual servers, visualization, or virtual storage but if you ever think about something that can help you with the management of email services, here comes AWS with a service, Simple Email Service — Amazon SES. It can be easily integrated with an already existing application or infrastructure hosted…


The blog focuses on some of the Cybersecurity Myths & a few tips to be known by millions of employees now attempting to work from home. Most of the organizations have recently noticed a rise in security threats and attacks during the COVID-19 pandemic. It is important to challenge misconceptions about cybersecurity.

The objective that cybercriminals never interact with their targets physically or virtually is one of the many cybersecurity myths that need to be realized. Due to the current COVID-19 pandemic, millions of employees are now attempting to work from home which increases their vulnerability more than ever. …


With the boom in resource availability via multiple digital platforms, there are tons of applications and websites available to perform the same task. A major concern then becomes faster response time and how to direct clients to your website. Having multiple competitors in the market to perform the same task, the one that attracts the audience is the one that provides a fast, responsive, and secure usage of the website. This is where Amazon Web Services — AWS jumps in with a service called Amazon CloudFront. …


Welcome Back! In the previous blog i.e. Fundamentals of Information Security — Part 1, we explored some of the basic fundamentals of Information Security and we also went through some of the differences between Information Security and Cyber Security. If you haven’t explored Part 1 yet, I would highly recommend reading through some of the basics in Part 1 and then proceed with Part 2.

Refer to: Fundamentals of Information Security — Part 1

Now, that you have an idea and a basic understanding of Information Security, the most common question that arises is that how can the sensitivity of…


People often get confused between the terms Information Security and Cyber Security. A few have a misconception that both the terms mean the same. In this blog, we will explore some of the basic fundamentals of information security and also glance through understanding the difference between Information Security and Cyber Security. Let’s dive in.

INFORMATION SECURITY

The term “Information Security” does not entirely mean securing the information from unauthorized access but it also involves the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information. The existence of information can either be in a physical…

Shreyansh Shah

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store