Ravi Das

Ravi is a Business Development Specialist for BiometricNews.Net, Inc., a technical communications and content marketing firm based out of Chicago, IL. The business was started in 2009, and has clients all over the world. Ravi’s primary area of expertise is Biometrics. In this regard, he has written and published two books through CRC Press. He is also a regular columnist for the Journal of Documents and Identity, a leading security publication based out of Amsterdam.

You can visit the company’s website at www.biometricnews.net (or http://biometricnews.blog/); and contact Ravi at ravi.das@biometricnews.net.

Ravi Das

Job outlook for CCSP cert holders [updated 2022]

Find out what to expect in the job market if you pursue a Certified Cloud Security Professional certification.

Maintaining your Network+ certification: renewal requirements [2022 update]

Network+ certification renewal is essential. Find out how to it and anything else you may need to know.

An Introduction to the PMP: Exam Details and Process [updated 2021]

Learn all about the Project Management Professional certification and why it might be right for you.

Information Security (IS) Auditor Salary and Job Prospects [Updated 2021]

Introduction Businesses and corporations have to make sure that their lines of defense are beefed up on a daily basis. If there is just one tiny crack in th

Average Web Application Penetration Testing Salary [Updated 2021]

Introduction For businesses and corporations, it is crucial to secure web based applications. After all, it is not just their bottom line at stake, but thei

The types of penetration testing [updated 2019]

In today's corporate environment, there is no doubt that security is now one of the main issues being addressed. Every day, you hear about Cyber hackers atta

10 best practices for mobile app penetration testing

Penetration testing is one of the best ways to thoroughly check your defense perimeters for security weaknesses. Pentesting can be used across the entire spe

An Introduction to Computer Forensics

Introduction One of the biggest threats facing businesses and corporations today is that of Cyber-attacks and threats. If these are large enough in scale an

Comparison of popular computer forensics tools [updated 2019]

This article will be highlighting the pros and cons for computer forensic tools. The tools that are covered in the article are Encase, FTK, XWays, and Oxygen

ICMP. Internet Control Message Protocol. Network concept. Server room on background.

The internet control message protocol (ICMP)

There are many security tools (such as firewalls, network intrusion devices and routers) out there that can alert network administrators of any penetrations

Top 31 threat-hunting interview questions and answers for 2019

In this article, we will examine the top thirty-one interview questions that could be asked of you as an applicant for the position of threat hunter. The pur

Teacher helping student at computer terminal with students in background (depth of field/high key)

How to get kids prepared for a career in cybersecurity

In the job market of today and especially tomorrow, there’s one thing for sure: Cybersecurity, no matter what the area or the specialization is, will be in e