<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Misbah  Thevarmannil</title><link>https://misbahabdulmajeed.journoportfolio.com</link><description>RSS Feed for Misbah  Thevarmannil</description><atom:link rel="self" href="http://misbahabdulmajeed.journoportfolio.com/rss.xml"></atom:link><language>en</language><lastBuildDate>Mon, 06 Dec 2021 00:00:00 +0000</lastBuildDate><item><title>1-3-5 Rule - Steps to Boost Your Team's Productivity &amp; Performance</title><link>https://desklog.io/blog/1-3-5-rule/</link><description>How to Boost Your Productivity at Workplace Using the 1-3-5 Rule

We are all fragile against the luring promises of procrastination and distraction. Most of us end up creating to-do lists that are humiliating with unfulfilled tasks. When we don’t have proper methods to chart our to-do list and plans – we mostly fail to get things done according to our wild- not so humanly possible plans. It is very important that we plan with a strategy in mind. This can help to boost our productivity significan</description><pubDate>Mon, 06 Dec 2021 00:00:00 +0000</pubDate><guid>https://desklog.io/blog/1-3-5-rule/</guid></item><item><title>Top Trends That Defines The Future of Mobile App Development</title><link>https://www.blogger.com/u/1/blog/post/edit/1141748633990199153/5402554648225515310?hl=en</link><description>Not your computer? Use Guest mode to sign in privately. Learn more</description><pubDate>Fri, 17 Sep 2021 00:00:00 +0100</pubDate><guid>https://www.blogger.com/u/1/blog/post/edit/1141748633990199153/5402554648225515310?hl=en</guid></item><item><title>Why Investment in Luxury Apartments will be a Lasting Joy</title><link>https://www.blogger.com/u/1/blog/post/edit/preview/1141748633990199153/6201393865032511233</link><description></description><pubDate>Tue, 03 Aug 2021 00:00:00 +0100</pubDate><guid>https://www.blogger.com/u/1/blog/post/edit/preview/1141748633990199153/6201393865032511233</guid></item><item><title>Review : Runaways by Fathima Bhutto</title><link>https://www.blogger.com/u/1/blog/post/edit/preview/1141748633990199153/160562293019071248</link><description></description><pubDate>Tue, 03 Aug 2021 00:00:00 +0100</pubDate><guid>https://www.blogger.com/u/1/blog/post/edit/preview/1141748633990199153/160562293019071248</guid></item><item><title>CYBERSECURITY NEWSLETTER</title><link>https://media.journoportfolio.com/users/174579/uploads/72410ac5-40e2-48bf-8372-91dbfec781ae.pdf</link><description></description><pubDate>Sun, 25 Jul 2021 00:00:00 +0100</pubDate><guid>https://media.journoportfolio.com/users/174579/uploads/72410ac5-40e2-48bf-8372-91dbfec781ae.pdf</guid></item><item><title>Types Of Malware And Importance Of Malware Analysis</title><link>https://redteamacademy.com/blogs/types-of-malware/</link><description>Malware is a specially designed malicious software that used to cause damage, exploit or harm any device, service, or network. Malware is used by hackers for gaining access to sensitive information or data for financial gain. Viruses, worms, trojans are all different types of malware. Malware examples include viruses, worms, Trojan viruses, spyware, adware, and ransomware.

Types of Malware and The Importance of Malware Analysis

In 1971 PDP 10 mainframe computers of Digital Equipment Corporatio</description><pubDate>Sun, 25 Jul 2021 00:00:00 +0100</pubDate><guid>https://redteamacademy.com/blogs/types-of-malware/</guid></item><item><title>Careers in Cybersecurity in 2021</title><link>https://redteamacademy.com/blogs/careers-in-cybersecurity-in-2021/</link><description>Careers in Cybersecurity | Why choose it as a career?

Careers in cybersecurity a decade ago was limited to huge companies and big cities. With the increase in cyber-attacks and a society that is more technologically driven, cybersecurity is the call of the hour in every city, big and small. So it is very important to know about the most demanding careers in cybersecurity in 2021.

The end games of the pandemics are too huge for the count. But there is a change that has come with it. Many compan</description><pubDate>Sun, 25 Jul 2021 00:00:00 +0100</pubDate><guid>https://redteamacademy.com/blogs/careers-in-cybersecurity-in-2021/</guid></item><item><title>How To Become An Ethical Hacker</title><link>https://redteamacademy.com/blogs/how-to-become-an-ethical-hacker/</link><description>How to Become An Ethical Hacker?

Let’s discuss on How to become an Ethical Hacker

Are you that hacker kid just who got over his 12th grade and looking for the right study guide on how to become an Ethical Hacker?

Well, to be truthful there is no manual that can give you the perfect path or timeline on how to become an ethical hacker. It will depend on the projects you work on, the opportunities you get exposed to, and hard work as well as luck. As wise men say “there is no shortcut to success</description><pubDate>Sun, 25 Jul 2021 00:00:00 +0100</pubDate><guid>https://redteamacademy.com/blogs/how-to-become-an-ethical-hacker/</guid></item><item><title>An Introduction to SIEM and its Implementation Tools</title><link>https://redteamacademy.com/blogs/types-of-siem-tools/</link><description>Types of SIEM Tools are commonly used by security administrators and security incident response professionals. Security Information and Event Management – SIEM orchestrates the complexity of the enterprise IT infrastructure through real-time collection and analysis of security alerts generated from the analysis of log data of various security incidents and technologies such as firewalls, critical applications antivirus systems, wireless access points, servers, routers, IDS /IPS systems, etc. whi</description><pubDate>Sun, 25 Jul 2021 00:00:00 +0100</pubDate><guid>https://redteamacademy.com/blogs/types-of-siem-tools/</guid></item><item><title>A Cyber Attack Every 11 Seconds, predicts 2021</title><link>https://redteamacademy.com/blogs/cyber-attacks-2021/</link><description>Cyber Attacks 2021 will happen every 11 seconds. With the Pandemic still lurking around for another year of doubt and unpredictability, the awareness for Cybersecurity and what 2021 holds for the cyber world is crucial to predict strategic responses for the challenges of a new year. Cybersecurity experts predict that cyber attacks 2021 will be twice as what happened in 2019. In 2021, it is predicted that a cyber attack will be reported every 11 seconds which is twice what it was in 2019 (every 1</description><pubDate>Sun, 25 Jul 2021 00:00:00 +0100</pubDate><guid>https://redteamacademy.com/blogs/cyber-attacks-2021/</guid></item></channel></rss>