Open in app

Sign In

Write

Sign In

Abeshek
Abeshek

3 Followers

Home

About

Pinned

Do you want to transition into a product management role?

At times many of us may feel that we are stuck in a profession, in a job role or in an organisation that is not for us. It may feel like it is not our true calling. Well, then why waste time? …

Career Switch

3 min read

Do you want to transition into a product management role?
Do you want to transition into a product management role?
Career Switch

3 min read


Apr 5, 2021

What is SEO: Search Engine Optimization?

Search Engine Optimization (SEO), simply means to increase your website visibility on to the Search Engine Result Page (SERP) organically, which means without any paid method. Search Engines like Google and Bing uses bots to go through the pages on the web and collect information about those pages and arrange…

SEO

2 min read

SEO

2 min read


Mar 5, 2021

Top 10 Hard Skills and Soft Skills in 2021

Competition demands innovation. How do you stand out within the limited career choices, job roles and industries? The answer is, “Upskill/Reskill yourself!” with the top required hard skills and soft skills. To save the effort of researching, we bring to you the top 10 most required hard and soft skills…

Soft Skills

3 min read

Top 10 Hard Skills and Soft Skills in 2021
Top 10 Hard Skills and Soft Skills in 2021
Soft Skills

3 min read


Mar 5, 2021

Importance of Microlearning: Byte sized learning

Microlearning — Modern learning strategy at the workplace In a world where skills and jobs continuously change, Professionals always crave learning and have a desire to learn even while they earn. Long instructional meetings, workshops, and big manuals to learn from are obsolete and monotonous. …

Professional Learning

3 min read

Importance of Microlearning: Byte sized learning
Importance of Microlearning: Byte sized learning
Professional Learning

3 min read


Mar 4, 2021

What is Cloud Security? How does Cloud Security work?

What is Cloud Security? Cloud security is the preserving and safeguarding of information stored online via cloud computing platforms from theft, data leakage, and deletion. There are various tools and technologies for providing cloud security solutions including firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet…

Cloud Computing

3 min read

What is Cloud Security? How does Cloud Security work?
What is Cloud Security? How does Cloud Security work?
Cloud Computing

3 min read


Mar 4, 2021

Type of vulnerable data for phishing

Type of vulnerable data for phishing Type of vulnerable data for phishing (antwak.com)

Cybersecurity

1 min read

Cybersecurity

1 min read


Mar 1, 2021

What is Cyber Threat Intelligence ?

Cyber threats aimed at business are identified by Threat Intelligence.IT specialists and complex tools can read and analyze the threats. This information is utilized to plan, forestall, and recognize cyber threats hoping to exploit important organization’s assets. Threat Intelligence collects and compiles the raw data about the threats emerging from…

Cyber Threat Intelligence

3 min read

What is Cyber Threat Intelligence ?
What is Cyber Threat Intelligence ?
Cyber Threat Intelligence

3 min read


Feb 25, 2021

How to prevent Ransomware attacks in 2021?

Ransomware is a sort of malware that cybercriminals use to extort cash. It holds information to ransom with encryption or by keeping users out of their devices. Few tips to prevent Ransomware attacks: This section gives you tips on the best way to safeguard from ransomware attacks. Never click on unverified weblinks Try not to click…

Ransomware

3 min read

How to prevent Ransomware attacks in 2021?
How to prevent Ransomware attacks in 2021?
Ransomware

3 min read


Feb 25, 2021

Cyber Attack: How to prevent it in 2021?

Having a strong security system is very essential for ever-growing threats to businesses. Cyber attacks & its threat are increasing problems for businesses. We often hear about businesses paying huge fines and even winding up their businesses due to systems being hacked. There are numerous threats to ignore risks from…

Cyber Attack Prevention

3 min read

Cyber Attack: How to prevent it in 2021?
Cyber Attack: How to prevent it in 2021?
Cyber Attack Prevention

3 min read


Feb 25, 2021

Penetration Testing: How to perform PenTest in Cybersecurity?

Penetration testing (PenTest) is the cycle to distinguish security weak points in an application by assessing the system or network with different malignant strategies. The weak areas of a system are exploited in this cycle through an approved simulated attack. The objective of this test is to get significant information…

Penetration Testing

3 min read

Penetration Testing: How to perform PenTest in Cybersecurity?
Penetration Testing: How to perform PenTest in Cybersecurity?
Penetration Testing

3 min read

Abeshek

Abeshek

3 Followers

SEO Manager - AntWak

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech