Skip to content
Quick Links
  • Documents
  • Events
  • Published Books
  • About Me
  • Video

MOBS Bangladesh

Meeting of Brilliant Syche – IT Pro's Corner

  • Home
  • Books
  • Events
  • Publications
  • Video
  • Documents
  • About Me

Tag: cybersecurity

Measure and Improve Your Vulnerability Management Program Maturity

February 19, 2024 Shuvro

Reading Time: 2 minutesIn the rapidly evolving landscape of cybersecurity, staying ahead of potential threats is crucial. A well-established Vulnerability Management Program (VMP) is essential for organizations aiming to safeguard their systems and data. However, measuring and enhancing the maturity of your VMP Read More …

Cybersecurity, Vulnerability ManagementCyber, cybersecurity, Vulnerability

Choosing the Right Cyber Risk Quantification Model

February 19, 2024 Shuvro

Reading Time: 3 minutesNavigating Cybersecurity Waters: Choosing the Right Cyber Risk Quantification Model In the dynamic landscape of cybersecurity, organizations face an array of threats that constantly evolve. To effectively manage these risks, it’s essential to adopt a robust cyber risk quantification model. Read More …

CybersecurityCyber, cybersecurity, Model, Quantification, Risk

SIEM & SOAR Better Together: How to Enhance Your Security Operations

February 18, 2024 Shuvro

Reading Time: 3 minutesSIEM & SOAR Better Together: How to Enhance Your Security Operations Security is a top priority for any organization, especially in today’s complex and dynamic threat landscape. However, managing security operations can be challenging, as security teams have to deal Read More …

CybersecurityCyber, cybersecurity, SIEM, SOAR

Threat Modeling with STRIDE

February 18, 2024 Shuvro

Reading Time: 4 minutesOne of the most popular frameworks for creating threat models is STRIDE, which stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. These are the six categories of threats that can affect a system. To Read More …

CybersecurityCyber, cybersecurity, STRIDE

Threat Driven Modeling in SOC

February 18, 2024 Shuvro

Reading Time: 2 minutesThreat Driven Modeling in CSOC is a methodology that aims to improve the cybersecurity posture of an organization by aligning its security operations with the current and emerging threat landscape. It involves identifying, prioritizing, and mitigating the most relevant and Read More …

CybersecurityCyber, cybersecurity, STRIDE

Artificial Intelligence in Cybersecurity Operation Center

February 16, 2024 Shuvro

Reading Time: 21 minutesAI is a powerful tool that can enhance the capabilities and efficiency of security teams, but it also poses new challenges and risks. Therefore, it is important to design, deploy, and use AI securely, and to be aware of the potential Read More …

CybersecurityAI, artificial intelligence, Cyber, cybersecurity

The Importance of Having a Data Scientist Team in Cyber Security Operation Center

February 15, 2024February 15, 2024 Shuvro

Reading Time: 8 minutesThe Importance of Having a Data Scientist Team in Cyber Security Operation Center Cyber security is one of the most critical and challenging domains in the modern world. With the increasing volume and complexity of data, cyber threats, and attacks, Read More …

CybersecurityCyber, cybersecurity

Posts navigation

Older posts
Newer posts

YouTube

http://www.youtube.com/ user/shuvromcse

Categories

Monthly Archives

MOBS Calendar

June 2025
S M T W T F S
1234567
891011121314
15161718192021
22232425262728
2930  
« May    

Creative Commons

The opinions and views expressed in this blog are those of the author and do not necessarily state or reflect those of any vendor's regardless of hardware or software.

All contents is provided "AS IS" with zero warranties and warnings, and confers no rights. You assume all risk for your use.

All the Trademarks are the property rights of their respected owners.

NOTE: Please be aware I get lots of emails, and I cannot assist and fix everyone's problems. Also, please do not be offended if you do not get a response.

Testimonials

SabeelShahab is the most technically sound guy I ever had the opportunity of working with.
Sabeel RahmanAccount Manager, EPGMicrosoft BangladeshDhaka, Bangladesh
I am working closely with Shahab for a little more than 3 years, and I know him both in  professional and personal capacity. Shahab amazed me with his integrity, trust, and unbelievable depth of Technological facts. I have never met anyone so competent in his/her profession. Shahab upgrades himself continually and I am so lucky to meet such a rare gentleman. He would be an asset to any organization who has engaged Shahab for his experience.
Ismail Jabih UllahHead, Org Development & TrainingLink3 Technologies Ltd. 
kanwarShahab, Your site is really fantastic. Contents compilation are awesome. Thank you very much for saving my time.
Khandaker AnwarAB Bank LimitedDhaka, Bangladesh

saranaHe is a proactive and tireless contributor who would make a great addition to any team. He is technologically very sound and I would highly recommend him for any technical position, as he naturally rises to the occasion when presented with something he is passionate about.

Sarana IslamBusiness DevelopmentOracleSingapore

An extremely knowledgeable person in his field of work. He takes learning and applying new technology at work as a continuous process. A problem solver within a given period of time and cost. I wish him all the best.

Wahidur Rahman Khandkar
AhsanShahab is a thorough tech analyst who has made impact in Public Sector accounts while discussion went from opportunity creation to a maximization of technology utilization and value proposition.
Ahsan SharifPS DirectorMicrosoft BangladeshDhaka, Bangladesh
DeependraShahab have been hugely extending his hands to Nepal market support apart from his daily duty of Bangladesh Sub with his deeper knowledge in various Microsoft technology to many of our customer and is really adding value to Nepal business
Deependra BajracharyaPartner Sales ExecutiveMicrosoft NepalNepal
TanzimShahab is an extra-ordinarily productive specialist on Microsoft’s server tool business. He is an exceptionally brilliant problem solver when it comes to designing solution architectures and developing infrastructures & deployment models.
Tanzim SaqibDeveloper EvangelistMicrosoft BangladeshDhaka, Bangladesh
KennethShahab is a very detail person and constantly striving to help customers to achieve the best value.
Kenneth Ng Sin KwangTechnical SpecialistMicrosoft MalaysiaMalaysia

Twitter

Tweets by ShahabAlYaminCh
Copyright mobs-bd.org. All rights reserved.
Proudly powered by WordPress | Education Hub by WEN Themes
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.
SIGN UP FOR NEWSLETTER NOW