Manoharan Mudaliar

Cyber Security Consultant

News More >

Guide to Web Application Pen-Testing

A Useful Guide to Web Application Pen-Testing

Penetration testing, or pen testing for short, is one of the most commonly used cybersecurity protocols for web ...
Hardware End-of-Life Data Breaches

Hardware End-of-Life Data Breaches: What You Need to Know

Cyber threats and cybersecurity go hand in hand; as one evolves, so must the other. As cybercriminals modify ...

Cisco Releases Major Security Updates on Various Platform

Cisco Security Advisory team releases security updates that address a vulnerability in multiple products. Summary Most of the ...

Google Chrome Releases Critical Updates

Summary Google released Chrome version 81.0.4044.138 for Windows, Mac, and Linux. It addresses vulnerabilities that an attacker could ...

COVID-19 CYBER WARNING BY CISA & NCSC

The U.S. Department of Homeland Security (DHS), the United Kingdom’s National Cyber Security Centre (NCSC), and Cybersecurity and ...

Oracle Server Web Logic Vulnerable CVE-2020-2883

Oracle released notification to users about the previously disclosed vulnerability CVE-2020-2883, however, as per https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2883 the date entry ...

Information Security More >

Cisco Releases Major Security Updates on Various Platform

Cisco Security Advisory team releases security updates that address a vulnerability in multiple products. Summary Most of the ...

COVID-19 CYBER WARNING BY CISA & NCSC

The U.S. Department of Homeland Security (DHS), the United Kingdom’s National Cyber Security Centre (NCSC), and Cybersecurity and ...

Microsoft Office 365 security best practice and recommendation

U.S. Govt Issues O365 Security Practice and Recommendation Summary The majority of businesses are shifting to Microsoft Office ...

What is IT-Governance Risk Compliance

Other than providing solutions in the form of quality products and services, a business’s primary purpose of existence ...

Cloud ComputingMore >

Advantages of Cloud Computing for Businesses

The Advantages of Cloud Computing for Businesses

The rise of cloud computing has made the limitations of conventional IT infrastructures far more apparent. As a ...
cyber security

Cloud Security Why It’s Crucial

Cloud computing offers a myriad of benefits, it also poses threat that can be combatd through strong security ...
Cloud Security in 2020

Cloud Security in 2020: Understanding Misconfiguration Risk

The COVID-19 pandemic has led to a seismic shift in how we work, forcing many organizations across the ...
Testing in the Age of Cloud Computing

A Look at Pen Testing in the Age of Cloud Computing

According to a recent report by Fugue, cloud misconfigurations are the leading cause of data breaches in the ...

Microsoft Office 365 security best practice and recommendation

U.S. Govt Issues O365 Security Practice and Recommendation Summary The majority of businesses are shifting to Microsoft Office ...

Key benefits of cloud computing

To understand Cloud Computing, let us know the IT Evolution. In the journey to cloud computing, information technology ...

About Blogger

Manoharan Mudaliar is a cyber security consultant, with a focus on information security, IT audit, cloud computing, disaster recovery, and encryption specialist.

Manoharan Mudaliar holds certification CISM "Certified Information Security Manager" in good standing" Issued by ISACA

https://www.youracclaim.com/badges/bdb5c5d2-2a66-4219-a269-f4ebfa4cdfc2

Dynamic Cybersecurity and IT Consultancy Services

Manoharan Mudaliar provides consultancy, support, and management services to organizations in every industry. With experience and a focus on cybersecurity, information security, cloud computing, IT audits, encryption specialization, and disaster recovery, I cater to the changing needs of businesses of all sizes.

Holding a certification CISM “Certified Information Security Manager” in good standing, I leverage innovative solutions and am driven by a passion to help businesses succeed and achieve their goals. My robust IT consulting solutions and cybersecurity consulting services define excellence for my varied clients.

With a clear understanding of the importance of confidentiality and security in businesses, I aspire to provide proactive preventive solutions to help my clients avoid being compromised. Cybercriminals are constantly evolving their tactics and innovating new techniques of carrying out cyber-attacks, leaving you vulnerable to loss of critical information and disruption of services. By assessing, analyzing, and providing solutions catered to cybersecurity and information security, I help you fill in the gaps in your system.

With a focus on efficiency, my cloud computing services are geared toward helping businesses adopt agile and flexible practices.

If your information systems have been compromised, my IT disaster recovery services and consultation will help you rebuild a strong foundation of protection to safeguard all vital information.

For consultancy and services tailored to your unique needs, get in touch with me today!

Subscribe to Receive Free Alerts

Please enter a valid email address.
Something went wrong. Please check your entries and try again.