Skip to content

Priyanka Aash

Priyanka has 10+ years of experience in Strategy, Community Building & Inbound Marketing and through CISO Platform has earlier worked with marketing teams of IBM, VMware, F5 Networks, Barracuda Network, Checkpoint, and more. Priyanka is passionate about Entrepreneurship and Enterprise Marketing Strategy. Earlier she co-founded CISO Platform- the world’s 1st online platform for collaboration and knowledge sharing among senior information security executives.

Unveiling the Trojan Horses Within: Navigating Insider Threats in Your Organization

Unveiling the Trojan Horses Within: Navigating Insider Threats in Your Organization In the vast arena of cybersecurity, while external threats often take the spotlight, a stealthier danger lurks within the very fabric of organizations—the insider threat. Imagine the security gates wide open to those deemed trustworthy, yet harboring the potential to wreak havoc or inadvertently… Read More »Unveiling the Trojan Horses Within: Navigating Insider Threats in Your Organization

Understanding SNMP Enumeration

Understanding SNMP Enumeration SNMP (Simple Network Management Protocol) is a widely used protocol for managing and monitoring network devices. SNMP enumeration is a crucial step in understanding the configuration and health of a network. In this blog post, we’ll explore the fundamentals of SNMP enumeration, and its importance, and provide practical examples to demonstrate the… Read More »Understanding SNMP Enumeration

Critical CVEs And Active Threats: Apache Tomcat, GoAnywhere MFT, PAS and More

Critical CVEs And Active Threats: Apache Tomcat, GoAnywhere MFT, PAS and More This week from January 22 to  25, the FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are popular commercial products used by variants of… Read More »Critical CVEs And Active Threats: Apache Tomcat, GoAnywhere MFT, PAS and More

RCE (Real Cyber Exploration) of RCE (Remote Code Execution)

In the ever-changing landscape of cybersecurity, understanding Remote Code Execution (RCE) is crucial. RCE poses a significant threat, allowing attackers to run code on a system remotely. Recent statistics highlight the prevalence of RCE vulnerabilities in cybersecurity incidents and bug bounty programs. Over the past year, RCE vulnerabilities accounted for a substantial percentage of reported… Read More »RCE (Real Cyber Exploration) of RCE (Remote Code Execution)