[{"id":1031,"link":"https:\/\/blog.sridarsri.com\/cyber-risk-assessment-methodology\/","name":"cyber-risk-assessment-methodology","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/CRAM.webp","alt":"Which Cyber Risk Assessment Methodology Suits SMEs Best?"},"title":"Which Cyber Risk Assessment Methodology Suits SMEs Best?","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 15, 2025","dateGMT":"2025-03-15 15:09:29","modifiedDate":"2025-03-15 15:09:31","modifiedDateGMT":"2025-03-15 15:09:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/do-it-yourself\/\" rel=\"category tag\">Do It Yourself!<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-security\/\" rel=\"category tag\">IT Security<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/pentesting\/\" rel=\"category tag\">Pentesting<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/rd\/\" rel=\"category tag\">Research & Development<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/do-it-yourself\/\" rel=\"category tag\">Do It Yourself!<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-security\/\" rel=\"category tag\">IT Security<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/pentesting\/\" rel=\"category tag\">Pentesting<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/rd\/\" rel=\"category tag\">Research & Development<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":48},"status":"publish","excerpt":""},{"id":1026,"link":"https:\/\/blog.sridarsri.com\/research-and-development\/","name":"research-and-development","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/Research-and-Development.webp","alt":"Research and Development (r&D)"},"title":"Research & Development (R&D) - Driving Ideas onto Innovation","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 12, 2025","dateGMT":"2025-03-12 03:14:43","modifiedDate":"2025-03-12 04:55:33","modifiedDateGMT":"2025-03-12 04:55:33","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/do-it-yourself\/\" rel=\"category tag\">Do It Yourself!<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/mobile-app-development\/\" rel=\"category tag\">Mobile App Development<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/rd\/\" rel=\"category tag\">Research & Development<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/software-engineering\/\" rel=\"category tag\">Software Engineering<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/do-it-yourself\/\" rel=\"category tag\">Do It Yourself!<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/mobile-app-development\/\" rel=\"category tag\">Mobile App Development<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/rd\/\" rel=\"category tag\">Research & Development<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/software-engineering\/\" rel=\"category tag\">Software Engineering<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":46},"status":"publish","excerpt":""},{"id":1020,"link":"https:\/\/blog.sridarsri.com\/mobile-app-development\/","name":"mobile-app-development","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/Mobile-App-Development.webp","alt":"Mobile App Development"},"title":"Mobile App Development: Building Feature-Rich, Future-Ready Applications with Enhanced Security","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 12, 2025","dateGMT":"2025-03-12 02:56:48","modifiedDate":"2025-03-12 04:57:57","modifiedDateGMT":"2025-03-12 04:57:57","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/mobile-app-development\/\" rel=\"category tag\">Mobile App Development<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/rd\/\" rel=\"category tag\">Research & Development<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/software-engineering\/\" rel=\"category tag\">Software Engineering<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/mobile-app-development\/\" rel=\"category tag\">Mobile App Development<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/rd\/\" rel=\"category tag\">Research & Development<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/software-engineering\/\" rel=\"category tag\">Software Engineering<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":57},"status":"publish","excerpt":""},{"id":1015,"link":"https:\/\/blog.sridarsri.com\/answer-engine-optimization-aeo\/","name":"answer-engine-optimization-aeo","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/Answer-Engine-Optimization.webp","alt":"AEO - Answer Engine Optimization"},"title":"Answer Engine Optimization (AEO): The Future of Search Visibility","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 12, 2025","dateGMT":"2025-03-12 02:45:11","modifiedDate":"2025-03-12 05:00:32","modifiedDateGMT":"2025-03-12 05:00:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/ai\/\" rel=\"category tag\">AI<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/seo\/\" rel=\"category tag\">Search Engine Optimization<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-applications\/\" rel=\"category tag\">Web Applications<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/seo\/\" rel=\"category tag\">Search Engine Optimization<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-applications\/\" rel=\"category tag\">Web Applications<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":52},"status":"publish","excerpt":""},{"id":1012,"link":"https:\/\/blog.sridarsri.com\/seo\/","name":"seo","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/SEO.webp","alt":"SEO"},"title":"SEO -Search Engine Optimization: The Key to Online Visibility","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 12, 2025","dateGMT":"2025-03-12 02:32:39","modifiedDate":"2025-03-12 05:04:05","modifiedDateGMT":"2025-03-12 05:04:05","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/seo\/\" rel=\"category tag\">Search Engine Optimization<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-applications\/\" rel=\"category tag\">Web Applications<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/seo\/\" rel=\"category tag\">Search Engine Optimization<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-applications\/\" rel=\"category tag\">Web Applications<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":5},"status":"publish","excerpt":""},{"id":1009,"link":"https:\/\/blog.sridarsri.com\/web-design\/","name":"web-design","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/The-Art-of-Web-Designing.webp","alt":"The Art of Web Designing"},"title":"Web Design: Creating Stunning Websites That Drive Results","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 11, 2025","dateGMT":"2025-03-11 15:25:43","modifiedDate":"2025-03-12 05:08:43","modifiedDateGMT":"2025-03-12 05:08:43","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":21},"status":"publish","excerpt":""},{"id":1006,"link":"https:\/\/blog.sridarsri.com\/web-applications\/","name":"web-applications","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/The-Power-of-Web-Applications.webp","alt":"The Power of Web Applications"},"title":"Web Applications: The Backbone of Modern Digital Businesses","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 11, 2025","dateGMT":"2025-03-11 15:02:18","modifiedDate":"2025-03-12 05:13:19","modifiedDateGMT":"2025-03-12 05:13:19","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/software-engineering\/\" rel=\"category tag\">Software Engineering<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-applications\/\" rel=\"category tag\">Web Applications<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/software-engineering\/\" rel=\"category tag\">Software Engineering<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/system-designing\/\" rel=\"category tag\">System Designing<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-applications\/\" rel=\"category tag\">Web Applications<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/web-design\/\" rel=\"category tag\">Web Design<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":25},"status":"publish","excerpt":""},{"id":1000,"link":"https:\/\/blog.sridarsri.com\/why-it-strategy-matters-the-key-to-business-success\/","name":"why-it-strategy-matters-the-key-to-business-success","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/why-IT-strategy-matters.webp","alt":"why IT strategy matters."},"title":"Why IT Strategy Matters: The Key to Business Success","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 11, 2025","dateGMT":"2025-03-11 14:36:11","modifiedDate":"2025-03-11 14:36:13","modifiedDateGMT":"2025-03-11 14:36:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-strategy\/\" rel=\"category tag\">IT Strategy<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-strategy\/\" rel=\"category tag\">IT Strategy<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":21},"status":"publish","excerpt":""},{"id":966,"link":"https:\/\/blog.sridarsri.com\/discover-the-importance-of-zero-trust-security\/","name":"discover-the-importance-of-zero-trust-security","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/Discover-the-Importance-of-Zero-Trust-Security.webp","alt":"Discover the Importance of Zero Trust Security"},"title":"Discover the Importance of Zero Trust Security","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 11, 2025","dateGMT":"2025-03-11 06:34:05","modifiedDate":"2025-03-11 06:34:07","modifiedDateGMT":"2025-03-11 06:34:07","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/iam\/\" rel=\"category tag\">IAM<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-security\/\" rel=\"category tag\">IT Security<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/iam\/\" rel=\"category tag\">IAM<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-security\/\" rel=\"category tag\">IT Security<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":43},"status":"publish","excerpt":""},{"id":960,"link":"https:\/\/blog.sridarsri.com\/learn-how-ai-is-transforming-cybersecurity\/","name":"learn-how-ai-is-transforming-cybersecurity","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/Learn-How-AI-is-Transforming-Cybersecurity.webp","alt":"Learn How AI is Transforming Cybersecurity"},"title":"Learn How AI is Transforming Cybersecurity","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 11, 2025","dateGMT":"2025-03-11 06:18:51","modifiedDate":"2025-03-11 06:26:24","modifiedDateGMT":"2025-03-11 06:26:24","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/ai\/\" rel=\"category tag\">AI<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-security\/\" rel=\"category tag\">IT Security<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-security\/\" rel=\"category tag\">IT Security<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":39},"status":"publish","excerpt":""},{"id":900,"link":"https:\/\/blog.sridarsri.com\/how-it-consultancy-services-can-help-your-business-grow\/","name":"how-it-consultancy-services-can-help-your-business-grow","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2025\/03\/How-IT-Consultancy-Services-Can-Help-Your-Business-Grow-1.webp","alt":"How IT Consultancy Services Can Help Your Business Grow"},"title":"How IT Consultancy Services Can Help Your Business Grow?","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Mar 10, 2025","dateGMT":"2025-03-10 12:44:50","modifiedDate":"2025-03-11 14:48:54","modifiedDateGMT":"2025-03-11 14:48:54","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/it-strategy\/\" rel=\"category tag\">IT Strategy<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/it-consultancy\/\" rel=\"category tag\">IT Consultancy<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-solutions\/\" rel=\"category tag\">IT Solutions<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/it-strategy\/\" rel=\"category tag\">IT Strategy<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":55},"status":"publish","excerpt":""},{"id":878,"link":"https:\/\/blog.sridarsri.com\/ai-goals-consciousness-self-awareness\/","name":"ai-goals-consciousness-self-awareness","thumbnail":{"url":"https:\/\/blog.sridarsri.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969.jpg","alt":""},"title":"AI Goals, Consciousness & Self-awareness : The Turing Test","author":{"name":"sri","link":"https:\/\/blog.sridarsri.com\/author\/sri\/"},"date":"Sep 9, 2023","dateGMT":"2023-09-09 03:46:01","modifiedDate":"2023-09-09 03:46:04","modifiedDateGMT":"2023-09-09 03:46:04","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/blog.sridarsri.com\/category\/ai\/\" rel=\"category tag\">AI<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/consciousness\/\" rel=\"category tag\">Consciousness<\/a>, <a href=\"https:\/\/blog.sridarsri.com\/category\/universal-energy\/\" rel=\"category tag\">Universal Energy<\/a>","space":"<a href=\"https:\/\/blog.sridarsri.com\/category\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/consciousness\/\" rel=\"category tag\">Consciousness<\/a> <a href=\"https:\/\/blog.sridarsri.com\/category\/universal-energy\/\" rel=\"category tag\">Universal Energy<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":59},"status":"publish","excerpt":""}]
- AI
- Compliance
- Consciousness
- Developing
- Do It Yourself!
- IAM
- IT Consultancy
- IT Security
- IT Solutions
- IT Strategy
- Leadership
- Mobile App Development
- Networking
- Offensive Security
- Pentesting
- Precautions
- Research & Development
- Riding Diaries
- Search Engine Optimization
- Security+
- Software Engineering
- System Designing
- Testing
- Uncategorized
- Universal Energy
- Unix/Linux
- Web Applications
- Web Design
Amplification Application Attacks ARP Poisoning authentication header Bluejacking Clickjacking DDoS DNS poisoning Domain Hijacking DoS Dumpster Diving encryption Evil Twin Firewall Impersonation Initialization Vector(IV) Jamming MAC Spoofing Man in the middle Networking Phishing Privilege Escalation QA Replay Ride SriLanka Rogue AP SDLC Session Hijacking Software Development Software Documentation Software Engineering Software Testing Spear Phishing Switch Security Tailgating Test Plan Trojan Typo Squatting URL hijacking Virtual Lan Vishing Vlan Whaling Why To Document? Zones