HIPAA compliance for mobile application What is HIPAA? HIPAA (Health Insurance Portability and Accountability Act) sets the standard for protecting sensitive patient data. HIPAA ensures the protection of patient information, provides electronic and physical security of patient information, limits disclosure Read more…
GDPR and its impact on privacy (new changes) You might be thinking – how does a EU regulation affect businesses in India and how we operate? This is a truly global regulations change that every company needs to follow and Read more…
The notorious targets for all sorts of cyber attacks can be zeroed down to the web applications. The increasing pattern of cyber attacks has led us, to not just inculcate cyber security as a luxury, rather as a necessity for Read more…
Security threats to SCADA and RTU The SCADA systems which tie up together the decentralized facilities like; oil and gas pipelines, waste water collection, power and water distribution systems were actually designed so as to be robust, open and to Read more…
Introduction to RTU The remote terminal unit abbreviated as RTU is an electronic device that is controlled through the use of a microprocessor. It helps interface the objects that are present in the physical world to a SCADA system by Read more…
Introduction to PLC Programmable logic controllers abbreviated as PLC are said to be industrial computers that help monitor inputs, make relevant decisions on the basis of their programs and thereby control outputs so as to automate processes or machines. It Read more…
Introduction to SCADA Supervisory Control and Data Acquisition abbreviated as SCADA is regarded as a complete system constituting of hardware and software components that helps allow industrial organizations to have control over the industrial processes either locally or at remote Read more…
RCIE Course Modules: 3.8 Firewall Policies Compliance Firewall Policies compliance Having a strong firewall policy allows companies to stay compliant to best practices. From a CCO standpoint, there are many tools and policies that can be implemented company-wide. CCOs can Read more…
INFORMATION GATHERING ( REDHAWK ) USING KALI Basic Reconnaisance: GEO-IP LOOKING GRAB BANNERS: DNS LOOKUP: SUBNET CALCULATOR: NMAP PORT SCANNING: SUBDOMAIN:
Data hacks are the number 1 concern in the minds of consumers right now. They lack trust in these large organizations, and don’t want to participate in their campaigns or promotions anymore. They are even getting more hesitant to transact Read more…