IOT Vulnerability Assessment and Penetration Testing IOT, which is a buzzword in many business industries […]
ISO 27017 & ISO 27018 Compliance Documentation
Cloud services offer great scalability and flexibility. However, for a company, the adoption of cloud […]
SQL Injection Attack Via ORM Sink
Test cases for SQL Injection via ORM Sink What is an SQL injection? SQL injection […]
SOC 2 FOR SERVICE ORGANISATIONS
SOC for Service Organizations reports are designed to help service organizations that provide services to […]
Cyber Forensics – Active Directory Investigation
In an industry running on Active Directory, if there is an espionage that needs to […]
Cyber Security Definitions
Confidentiality is the term used to describe information/data privacy which means the information is not […]