Help
RSS
API
Feed
Maltego
Contact
Domain > anujtewari.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2015-02-15
184.168.27.42
(
ClassC
)
2024-08-12
172.67.130.185
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Mon, 12 Aug 2024 04:41:01 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveCache-Control: max-age3600Expires: Mon, 12 Aug 2024 05:41:01 GMTLocation: https://anujtewari.com/Report-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?skllHBBsHJfyO26AhGJZZDvvG02kds%2B%2B5B57P%2F7COH75Sddy18poRDKFKBAwUhfKmoQ09VoZSs36846ggcD%2FHKln14WURrXMt64xU5lm3YSs8ifWI0UYa7LN8LEtkN6RGBQ%3D%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}X-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 8b1dca66fddb1736-SJCalt-svc: h3:443; ma86400 html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>cloudflare/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 12 Aug 2024 04:41:01 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-alivelast-modified: Sun, 21 Jun 2020 12:30:29 GMTvary: Accept-Encodingx-powered-by: ASP.NETx-powered-by-plesk: PleskWinCF-Cache-Status: DYNAMICReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?sd3Z5XZxaQpBVZYSjBwTgqiVMuh3yPpQIjkNFtIVoGW8kfcv4nk3EMYndutfsWxpg2brlfWseE7fTJSBYpakwM2ZeLW%2FQ7PBFZvWFTQ%2BP4BIJ10giy%2BWophot4EhUzec7dw%3D%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Strict-Transport-Security: max-age0; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 8b1dca67bf5e9695-SJCalt-svc: h3:443; ma86400 !DOCTYPE HTML>html langen-US>head>meta charsetutf-8 />meta langen-us />meta name”description” content”Anuj Tewari, Executive Advisor, Cybersecurity, Hacker”>meta name”keywords” content”Anuj Tewari Executive Advisor Cybersecurity Ethical Hacker transformation” />meta nameviewport contentwidthdevice-width, initial-scale1, user-scalableno />meta nameauthor contentAnuj Tewari />title>Anuj Tewari - Risk & Compliance Executive/title>script src/cdn-cgi/apps/head/AmmuiLhqT6owzJ5ByP6sf9_hS5A.js>/script>link rel”canonical” href”https://www.anujtewari.com”/>link rel”canonical” href”https://anujtewari.com”/>link relstylesheet hrefassets/css/main.css />script async srchttps://www.googletagmanager.com/gtag/js?idUA-168064210-1 typec90174af4be32785e2929bbb-text/javascript>/script>script typec90174af4be32785e2929bbb-text/javascript> window.dataLayer window.dataLayer || ; function gtag(){dataLayer.push(arguments);} gtag(js, new Date()); gtag(config, UA-168064210-1); /script>meta namerobots contentall />meta namegooglebot contentindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1>meta namerobots contentindex, follow>meta namebingbot contentindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1>meta propertyog:locale contenten_US />meta propertyog:type contentprofile />meta propertyprofile:first_name contentAnuj />meta propertyprofile:last_name contentTewari />meta propertyog:title contentAnuj Tewari - Risk & Compliance Executive />meta propertyog:description contentAnuj Tewari, Executive Advisor, Cybersecurity, Hacker />meta propertyog:url contenthttps://www.anujtewari.com/index.html />meta propertyog:site_name contentAnuj Tewari />meta propertyarticle:publisher contentAnuj Tewari />meta nametwitter:card contentsummary_large_image />meta nametwitter:creator content@mailanuj />meta nametwitter:site content@mailanuj />script typeapplication/ld+json> { @context: http://www.schema.org, @type: ProfessionalService, name: Anuj Tewari, url: anujtewari.com, description: Anuj Tewari} /script>link relapple-touch-icon sizes180x180 hreffavicon/apple-touch-icon.png>link relicon typeimage/png sizes32x32 hreffavicon/favicon-32x32.png>link relicon typeimage/png sizes16x16 hreffavicon/favicon-16x16.png>link relmanifest hreffavicon/site.webmanifest>noscript>link relstylesheet hrefassets/css/noscript.css />/noscript>/head>body classis-preload>div idwrapper classfade-in>div idintro>h1>Anujbr/>Tewari/h1>p> Risk & Compliance Executive/p>ul classactions>li>a href#header classbutton icon solid solo fa-arrow-down scrolly>Continue/a>/li>/ul>/div>header idheader>a hrefindex.html classlogo>Anuj Tewari/a>/header>nav idnav>ul classlinks>li classactive>a hrefindex.html>Outreach/a>/li>li>a hrefaboutme.html>About Me/a>/li>/ul>ul classicons>li>a hrefhttps://www.linkedin.com/in/anujtewari/ target_blank classicon brands fa-linkedin>span classlabel>Linkedin/span>/a>/li>li>a hrefhttps://twitter.com/MailAnuj target_blank classicon brands fa-twitter>span classlabel>Twitter/span>/a>/li>/ul>/nav>div idmain>article>header>h2>Knowledge Reciprocity /h2>p>The practice of exchanging knowledge with others for mutual benefitbr>Sharing our knowledge and skill sets with others is critical for advancement and to make room for new ideas, especially as risk landscape stays fluid with rapidly evolving business models.br> Sharing what we know not only helps others in the community, it also helps hone our own skillsbr/>/p>/header>div classimage main>img srcevents/AnujTewari_Speaker_Home.jpg altAnuj Tewari Speaker />/article>section classposts>article>header>h2>a href/posts/HybridCloud.html>Security Considerations for Hybrid Cloud Security/a>br>br>/h2>/header>a href/posts/HybridCloud.html classimage fit>img srcevents/HybridCloud.png altAnuj Tewari Hybrid Cloud />/a>p>Hybrid cloud is the new normal its usage needs to be balanced with the flexibility, cost savings, with security & privacy considerations/p>ul classactions special>li>br>a href/posts/HybridCloud.html classbutton>Read More/a>/li>/ul>/article>article>header>h2>a href/posts/CyberThreats.html>Effective and timely detection of CyberSecurity threats/a>/h2>/header>a href/posts/CyberThreats.html classimage fit>img srcevents/CyberThreats.jpg altAnuj Tewari Cyber Threats />/a>p>Presented on effective approaches to detection of CyberSecurity threats at Infosec Intelligence Conclave/p>ul classactions special>li>br>br>a href/posts/CyberThreats.html classbutton>Read More/a>/li>/ul>/article>article>header>h2>a href/posts/ThreatHunting.html>Is Detection a Myth? An Effective Approach to Threat Hunting/a>/h2>/header>a href/posts/ThreatHunting.html classimage fit>img srcevents/ThreatHunting.jpg altAnuj Tewari Threat Hunting />/a>p>Presentation in the Fraud and Breach Prevention summit by ISMG/p>ul classactions special>li>br>a href/posts/ThreatHunting.html classbutton>Read More/a>/li>/ul>/article>article>header>h2>a href/posts/CognitiveIntelligence.html>Use of Cogniotive Intelligence by Adversaries/a>/h2>/header>a href/posts/CognitiveIntelligence.html classimage fit>img srcevents/CognitiveIntelligence.png altAnuj Tewari Cognitive Intelligence />/a>p>Shared thoughts on use of Cognitive Intelligence by adversaries at the event datacentre summits & awards./p>ul classactions special>li>br>a href/posts/CognitiveIntelligence.html classbutton>Read More/a>/li>/ul>/article>article>header>h2>a href/posts/mlai.html>Role of Machine Learning and Artificial Intelligence in Cybersecurity/a>/h2>/header>a href/posts/mlai.html classimage fit>img srcevents/MachineAI.png altAnuj Tewari Machine Learning />/a>p>Anuj Tewari Shared views on topic Can machine learning and artificial intelligence do more than humans canbr>br>/p>ul classactions special>li>a href/posts/mlai.html classbutton>Read More/a>/li>/ul>/article>article>header>h2>a href/posts/humanthreat.html>Humans a Bigger Security Threat than Machines/a>br>br>/h2>/header>a href/posts/humanthreat.html classimage fit>img srcevents/humanbiggerthreat_thumbnail.png altAnuj Tewari Humans a Bigger Security Threat than Machines />/a>p>Shipra Malhotra from Dynamic CISO in conversation with Anuj Tewari/p>ul classactions special>li>br>br>a hrefposts/humanthreat.html classbutton>Read More/a>/li>/ul>/article>/section>/div>footer idfooter>section classsplit contact>section>ul classicons alt>/ul>/section>/section>/footer>div idcopyright>ul>li>© Anuj Tewari/li>/ul>/div>script srcassets/js/jquery.min.js typec90174af4be32785e2929bbb-text/javascript>/script>script srcassets/js/jquery.scrollex.min.js typec90174af4be32785e2929bbb-text/javascript>/script>script srcassets/js/jquery.scrolly.min.js typec90174af4be32785e2929bbb-text/javascript>/script>script srcassets/js/browser.min.js typec90174af4be32785e2929bbb-text/javascript>/script>script srcassets/js/breakpoints.min.js typec90174af4be32785e2929bbb-text/javascript>/script>script srcassets/js/util.js typec90174af4be32785e2929bbb-text/javascript>/script>script srcassets/js/main.js typec90174af4be32785e2929bbb-text/javascript>/script>script src/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js data-cf-settingsc90174af4be32785e2929bbb-|49 defer>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]