Skip to content
InfosecBytes

InfosecBytes

Simplifying Security Concepts!

  • HOME
  • ABOUT
Why Secure Boot Matters: Preventing Unauthorized Code Execution
OS Security Posted on: June 27, 2023March 16, 2025

Why Secure Boot Matters: Preventing Unauthorized Code Execution

As the technology advances, cyber threats are becoming more sophisticated and powerful than ever. In […]

Read More
ASLR Explained: Why Randomizing Memory Layouts Matters for Security
OS Security Posted on: June 15, 2023May 6, 2025

ASLR Explained: Why Randomizing Memory Layouts Matters for Security

Address Space Layout Randomization, or ASLR for short, is one of the most important computer […]

Read More
Modern Processor Architectures: How Instruction Sets Drive Innovation
OS Security Posted on: June 7, 2023March 16, 2025

Modern Processor Architectures: How Instruction Sets Drive Innovation

Modern processor architectures are the essential elements of today’s computing that drives everything from handheld […]

Read More
LSMs & KSPP Explained: Advanced Security Strategies for Linux
OS Security Posted on: May 27, 2023April 14, 2025

LSMs & KSPP Explained: Advanced Security Strategies for Linux

Linux operating system is widely used in servers, embedded systems, cloud infrastructure and containerised environments. […]

Read More
Protecting the Core: Advanced Kernel Hardening for Secure Systems
OS Security Posted on: May 20, 2023May 6, 2025

Protecting the Core: Advanced Kernel Hardening for Secure Systems

An Operating System kernel is the heart of computer that controls how software interacts with […]

Read More
Understanding SSH: History, Implementation, and Security Considerations
OS Security Posted on: February 13, 2023February 15, 2025

Understanding SSH: History, Implementation, and Security Considerations

Secure Shell (SSH) is one of the most fundamental tools in the realm of network […]

Read More
Syslog Simplified: Unveiling the Core of Logging and Monitoring
OS Security Posted on: December 5, 2022February 15, 2025

Syslog Simplified: Unveiling the Core of Logging and Monitoring

In today’s complex IT environments, managing and monitoring system events across a wide range of […]

Read More

Author

...

Nandkishor Lohot

Security Architect
Nandkishor Lohot is a seasoned security architect and researcher with over 16 years of experience in areas such as Enterprise Security Architecture, AI/ML Security, DevSecOps, Cloud and Container Security, Zero Trust Architecture, Cryptography, IAM, Open Source Security, OS Internals, Reverse Engineering, Vulnerability Research, Threat Modeling, Infrastructure as Code, and Platform Engineering.
 nandkishor@infosecbytes.io  infosecbytes.io
  • AI/ML (0)
  • Application Security (0)
  • Cloud Security (0)
  • Container Security (0)
  • Cryptography (0)
  • DevOps (3)
  • Identity & Access Mgmt. (2)
  • Infra Security (1)
  • IoT (1)
  • Misc (0)
  • Network Security (10)
  • OS Internals (7)
  • OS Security (7)
  • Vulnerability Research (0)
  • Zero Trust (0)

ARP ASLR Authentication BGP Chef CPU Architecture DevOps IaC IAM ICMP IoT ISA Kernel Security Linux Linux Internals Linux Kernel Linux Security Linux Syscalls Logging & Monitoring Memory Management MQTT mTLS NetFlow Networking Fundamentals Networking Protocols Network Monitoring Network Security OS Internals OSPF OS Security Packet Sniffing Protection Rings QUIC Secure Boot SNMP SSH Syslog TLS Traffic Analysis Windows Internals

🤞 Don’t miss these tips!

We don’t spam! Read more in our privacy policy

Check your inbox or spam folder to confirm your subscription.

© InfosecBytes, 2025. All Rights Reserved.