Mahwish Khan

Mahwish Khan is a Pharm-D graduate from The University of Faisalabad. She is experienced in technical writing. She currently works for a university as a technical trainer and documentation specialist. In the past, she has taught university writing courses and worked in two university writing centers, both as a consultant and administrator.
Mahwish Khan

Top 10 Free Threat-Hunting Tools

Threat hunting is an alternative approach to dealing with cyber-attacks, compared to network security systems that include appliances such as firewalls that

Internet data center room with server and networking device on rack cabinet and kvm monitor with charts on screen and cloud services icon with connection lines, cloud computing concept

How to build a successful continuous monitoring (CM) program

For years, continuous monitoring has been serving the IT industry regardless of the size of the businesses utilizing it. Historically, the ITIL programs feat

Global digital technologies. Big Red digital code as matrix stream background, computer code with shining red digits in perspective

Red Team Assessment Phases – Everything You Need to Know!

The antagonistic approach of a Red Team makes things challenging to an organization’s system, policies, anticipations and adaptations. These days, organizati


The VERIS methodology was created by Verizon back in 2010. This was an effort to create an environment for the classification of specific information. The VE

Anti-phishing training vs. software: Does security awareness training work?

Due to the increasing advances in today's technology, endpoint protection, and security software solutions are becoming even better at protecting your data.

Comparing Mobile & Web Application Penetration Testing

Pentesting mobile applications is quite different from pentesting web applications. Comparing the two processes lets us make better choices for our security

The Best & Worst Practices of Incident Response

Introduction Incident response is often an impromptu security area — organizations don't think about it until an incident occurs. Your response to an inciden

Breach Notification Requirements for Healthcare Providers

The healthcare industry has so many data security regulations that it can become overwhelming. These regulations are developed and implemented at the local,

9 Tips for Improving Your Incident Response Strategy

Introduction Incident response is a complex process involving many moving parts. Follow these suggestions to improve incident response across your organizati

Top 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It

HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient

Top 7 Tips to Secure Your Passwords

In our current world where technology is finding its way into all aspects of our life, it is important to understand how to properly protect yourself online

How to Avoid Becoming a Victim of the Next Global Cyber Attack

Wanna Cry's rampant spread across devices scattered across the globe, one of the largest global cyber-attacks in recent memory, not only held sensitive info