Cyber Security

Day 12 – Security Policies & ComplianceStandards (ISO, GDPR, HIPAA)

When I consult with businesses—from startups in Nagpur to multinational partners—the number one question they ask after setting up technical defenses is: “Are we compliant?” Why? Because in 2025, failure to follow security policies and compliance standards doesn’t just mean higher security risk—it means legal penalties, loss of reputation, and even business shutdowns. At CuriosityTech.in […]

Day 12 – Security Policies & ComplianceStandards (ISO, GDPR, HIPAA) Read More »

, , ,

Day 10 – Web Security: SQL Injection, XSS, CSRF Explained

Introduction In my two decades as a security consultant, one truth has stood strong: most cyber breaches don’t come from exotic AI viruses or James Bond-style espionage… they come from web application flaws. The same websites we shop on, bank with, or log into daily are prime targets for attackers. Three of the most dangerous

Day 10 – Web Security: SQL Injection, XSS, CSRF Explained Read More »

, , , ,

Day 25 – Common Mistakes in Cyber Security & How to Avoid Them

Introduction (Story Format) A few years ago, I was called into a mid-size startup after their servers were encrypted by ransomware. They had a firewall, antivirus, and even a part-time IT consultant — yet the breach happened because of basic, avoidable mistakes: weak passwords, no backups tested, and an unpatched VPN appliance. The lesson was

Day 25 – Common Mistakes in Cyber Security & How to Avoid Them Read More »

, , , ,

Day 6 – Common Cyber Threats: Malware, Phishing, Ransomware Explained

During my consulting years at CuriosityTech.in in Nagpur, I often encountered companies who believed: “We are too small to be hacked.” Yet, every time reality proved otherwise. Attackers don’t discriminate; they automate. And among the thousands of threat types, three dominate the danger landscape: Malware, Phishing, and Ransomware. This blog is structured as a Problem–Solution

Day 6 – Common Cyber Threats: Malware, Phishing, Ransomware Explained Read More »

, , , ,

Day 26 – Interview Questions & Answers for Cyber Security Engineers

Introduction (Narrative) When I sit on interview panels for cybersecurity engineers, I often realize that candidates with strong certifications still struggle with real-world scenarios. They memorize definitions of firewalls and SIEMs but stumble when asked: “What would you do if your SOC detects a brute-force attack on an SSH server at 2 AM?” This blog

Day 26 – Interview Questions & Answers for Cyber Security Engineers Read More »

, , ,

Day 21 – Security Automation: Tools & Scripts for Cyber Engineers

Day 21 – Security Automation: Tools & Scripts for Cyber Engineers Security teams are under constant pressure: more assets, faster deployments, and threats that never sleep. Manual processes can’t keep pace. Automation is the difference between an overwhelmed SOC and a proactive, resilient security program. Over 20 years I’ve watched the discipline move from ad-hoc

Day 21 – Security Automation: Tools & Scripts for Cyber Engineers Read More »

, , , , , , , ,