Cyber Crime Investigator | First Woman Cyber Crime Investigator
by Dhanya Menon | Jan 28, 2026 | personal
I have been penning this note and editing this many many times now. Rewriting sometimes and editing the others. No matter how long i take to write or how many times i edit this, i …
read moreby Dhanya Menon | Jan 28, 2026 | Dance
Dancing has been my medium of communication. And Mohiniyattom is my mother tongue, my first love. The medium tempo and the poetic expressions that form allows has always insighted me. the hyper human in me …
read moreby None | Jan 28, 2026 | Cyber Security
AI and cyber security important pointers: AI and cyber security are interconnected. Making Data all the more relevant and important. Challenges and Limitations for AI functioning 1. Data Quality: AI requires high-quality, relevant data to...
read moreby None | Feb 13, 2026 | None
A future threat that we where all anticipating at one time such as deepfakes and other AI imagery is no longer hypothetical but the good news is there are laws to combat it. The digital …
read moreby by Dhanya Menon | Feb 23, 2026 | Cyber Security
Device Security Your device is your responsibility. It could be the point of intrusion in your business. Your device could be used to cripple your business or as a gateway to intrude into someone else’s …
read moreby by Dhanya Menon | Feb 23, 2026 | Cyber Security
The Problem... Starts with the Users! Enterprise users don’t like security. Have little knowledge of security. Value convenience over security. Are often ignorant of regulatory security rules/policies. Feel they have the right to employee privacy. …
read moreby by Dhanya Menon | Feb 23, 2026 | Cyber Security
Data Backup Identify what needs back up. Identify the methods or options available for back up Consider multi device back up Consider multi location back up Consider cloud back up Take regular backups of your …
read moreby None | Feb 23, 2026 | None
Passwords and Their Importance Passwords are the easiest, simplest, and most effective way to protect your data from unauthorized use. The challenge is to effectively set and use passwords. All gadgets should have a boot …
read moreby by Dhanya Menon | Feb 23, 2026 | Cyber Security
Device Security Your device is your responsibility. It could be the point of intrusion in your business. Your device could be used to cripple your business or as a gateway to intrude into someone else’s …
read moreby by Dhanya Menon | Feb 23, 2026 | Cyber Security
Establish cybersecurity as a pillar of organizational success. Foster a culture of resilience and safeguard your organization’s future. The new entrant is AI. Leverage AI for security while defending against AI-enabled threats, adding both complexity …
read moreby by Dhanya Menon | Feb 23, 2026 | Cyber Security
Have you ever received a link in an email or message and thought, “What’s wrong with clicking it to see what it is?” If so, you are exactly the type of person cyber criminals target. …
read more
by by Dhanya Menon | Feb 23, 2026 | Personal
Digital forensics investigation is the process of identifying, extracting, preserving, and documenting digital evidence using specialized tools. Any data that has been recovered, processed, or investigated must be securely preserved and presented as evidence in …
read more