Bharath Narayanasamy is the principal cybersecurity consultant at TekGenX, specializing in offensive security, detection engineering, incident response, and GRC. Certified in CySA+, eJPTv2, Security+, CCNA, CCSA, and ISO 27001 Lead Implementer & Lead Auditor, he delivers end-to-end security solutions that transform complex requirements into measurable, resilient outcomes.
Introduction to Log Management Logs are a record of events within a system. These records provide a detailed account of what a system has been doing, capturing a wide range…
Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to business objectives…
NIST Functions Identify – Understand what you have and includes activities such as asset management, governance, risk assessment. Protect – Build safeguards and controls to protect what is important to…
NIST - Security Incident Handling 1. Preparation The preparation phase covers the readiness of an organization against an attack. That means documenting the requirements, defining the policies, incorporating the security…
Bourne Again Shell The main difference between scripting and programming languages is that we don't need to compile the code to execute the scripting language, as opposed to programming languages.…
Splunk Components Splunk Forwarder Splunk Forwarder is a lightweight agent installed on the endpoint intended to be monitored, and its main task is to collect the data and send it to…
Risk Management Frameworks There are several frameworks for risk assessment. Example methodologies are: NIST SP 800-30: A risk assessment methodology developed by the National Institute of Standards and Technology (NIST).…
Risk Avoidance Risk Acceptance Risk Reduction Basic Terminology Threat: an intentional or accidental event that can compromise the security of an information system. Examples include hacking, phishing attacks, human error,…