Skip to content
Quick Links
  • Blueprints
  • Documents
  • Events
  • Published Books
  • About Me
  • Video

MOBS Bangladesh

Meeting of Brilliant Syche – IT Pro's Corner

  • Home
  • Books
  • Events
  • Publications
  • Video
  • Documents
  • Blueprints
  • About Me

Threat Driven Modeling in SOC

February 18, 2024 Shuvro

Reading Time: 2 minutesThreat Driven Modeling in CSOC is a methodology that aims to improve the cybersecurity posture of an organization by aligning its security operations with the current and emerging threat landscape. It involves identifying, prioritizing, and mitigating the most relevant and Read More …

CybersecurityCyber, cybersecurity, STRIDE

Artificial Intelligence in Cybersecurity Operation Center

February 16, 2024 Shuvro

Reading Time: 21 minutesAI is a powerful tool that can enhance the capabilities and efficiency of security teams, but it also poses new challenges and risks. Therefore, it is important to design, deploy, and use AI securely, and to be aware of the potential Read More …

CybersecurityAI, artificial intelligence, Cyber, cybersecurity

The Importance of Having a Data Scientist Team in Cyber Security Operation Center

February 15, 2024February 15, 2024 Shuvro

Reading Time: 8 minutesThe Importance of Having a Data Scientist Team in Cyber Security Operation Center Cyber security is one of the most critical and challenging domains in the modern world. With the increasing volume and complexity of data, cyber threats, and attacks, Read More …

CybersecurityCyber, cybersecurity

Firewall Protection

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minuteFirewall Protection Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They establish a barrier between secured and controlled internal networks and untrusted outside networks, such as the Internet. Using Read More …

CybersecurityCyber, cybersecurity, Firewall, Protection

Network Device Configuration

February 10, 2024 Shuvro

Reading Time: < 1 minuteNetwork Device Configuration Proper configuration of network devices is crucial for maintaining a secure network environment. Misconfigured network devices can provide loopholes that can be exploited by cybercriminals. Using Network Device Configuration benchmarks, such as the CIS Benchmarks, offers several Read More …

CybersecurityCyber, cybersecurity, Network, Network Device Configurations

VPN Access

February 10, 2024February 16, 2024 Shuvro

Reading Time: < 1 minuteVPN Access Virtual Private Networks (VPNs) provide a secure connection to another network over the Internet. They can protect your web traffic from snooping, interference, and censorship. Some best practices for VPN Access: Use Strong Encryption: Always use a VPN Read More …

Cybersecuritycybersecurity, VPN Access

Enterprise Architecture Strategy (EAS)

February 10, 2024February 16, 2024 Shuvro

Reading Time: 2 minutesEnterprise Architecture Strategy An Enterprise Architecture Strategy provides a long-term view of a company’s processes, systems, and technologies so that the organization can align its business strategy with its IT strategy. This alignment is crucial in ensuring that the organization Read More …

Cybersecuritycybersecurity, Enterprise Architecture Strategy

Posts navigation

Older posts
Newer posts

YouTube

http://www.youtube.com/ user/shuvromcse

Categories

Monthly Archives

MOBS Calendar

July 2025
S M T W T F S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Jun    

Creative Commons

The opinions and views expressed in this blog are those of the author and do not necessarily state or reflect those of any vendor's regardless of hardware or software.

All contents is provided "AS IS" with zero warranties and warnings, and confers no rights. You assume all risk for your use.

All the Trademarks are the property rights of their respected owners.

NOTE: Please be aware I get lots of emails, and I cannot assist and fix everyone's problems. Also, please do not be offended if you do not get a response.

Testimonials

DeependraShahab have been hugely extending his hands to Nepal market support apart from his daily duty of Bangladesh Sub with his deeper knowledge in various Microsoft technology to many of our customer and is really adding value to Nepal business
Deependra BajracharyaPartner Sales ExecutiveMicrosoft NepalNepal
AhsanShahab is a thorough tech analyst who has made impact in Public Sector accounts while discussion went from opportunity creation to a maximization of technology utilization and value proposition.
Ahsan SharifPS DirectorMicrosoft BangladeshDhaka, Bangladesh
KennethShahab is a very detail person and constantly striving to help customers to achieve the best value.
Kenneth Ng Sin KwangTechnical SpecialistMicrosoft MalaysiaMalaysia
TanzimShahab is an extra-ordinarily productive specialist on Microsoft’s server tool business. He is an exceptionally brilliant problem solver when it comes to designing solution architectures and developing infrastructures & deployment models.
Tanzim SaqibDeveloper EvangelistMicrosoft BangladeshDhaka, Bangladesh

An extremely knowledgeable person in his field of work. He takes learning and applying new technology at work as a continuous process. A problem solver within a given period of time and cost. I wish him all the best.

Wahidur Rahman Khandkar
SabeelShahab is the most technically sound guy I ever had the opportunity of working with.
Sabeel RahmanAccount Manager, EPGMicrosoft BangladeshDhaka, Bangladesh
kanwarShahab, Your site is really fantastic. Contents compilation are awesome. Thank you very much for saving my time.
Khandaker AnwarAB Bank LimitedDhaka, Bangladesh

saranaHe is a proactive and tireless contributor who would make a great addition to any team. He is technologically very sound and I would highly recommend him for any technical position, as he naturally rises to the occasion when presented with something he is passionate about.

Sarana IslamBusiness DevelopmentOracleSingapore
I am working closely with Shahab for a little more than 3 years, and I know him both in  professional and personal capacity. Shahab amazed me with his integrity, trust, and unbelievable depth of Technological facts. I have never met anyone so competent in his/her profession. Shahab upgrades himself continually and I am so lucky to meet such a rare gentleman. He would be an asset to any organization who has engaged Shahab for his experience.
Ismail Jabih UllahHead, Org Development & TrainingLink3 Technologies Ltd. 

Twitter

Tweets by ShahabAlYaminCh
Copyright mobs-bd.org. All rights reserved.
Proudly powered by WordPress | Education Hub by WEN Themes

SUBSCRIBE

GET NOTIFIED WHEN A NEW TOPIC IS POSTED

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.