While providing consultancy on cyber security, I am often asked a question by bank’s senior […]
Top 5 Reasons To Perform VAPT Of Your Web Application
I guess most of us know why a vulnerability assessment and penetration testing needs to […]
Tips To Implement GDPR For SaaS Based Products
While there are many companies going for or considering GDPR implementation after 25th May 2018, […]
Top Threats In Cloud Security
“Top Threats to Cloud Computing”, provides needed background to help organizations in making refined risk […]
Mobile Apps: Owner’s Pride, Hacker’s Gain
Did you know that a mobile application, on an average has 9 vulnerabilities? Multiply that […]
Vulnerability Assessment – Automated v/s Manual Testing
We all know that there are 3 distinct pillars of software testing – functional testing, […]
Why Hackers Like The Healthcare Industries
To the question in title, if I was a hacker I would ask myself “why […]
Why Manufacturing Industry is Prone to Ransomware Attacks
2017 was clearly an year of ransomwares. We saw Locky, Petya, GoldenEye, Wannacry and their […]
Learnings From The Cyber Attacks on Banking Industry
Year 2018 was full of cyber-attacks and the most serious news was about well-orchestrated cyber-attacks […]
How To Select Your ISO 27001 Implementation Partner
While choosing ISO27001 consultant or implementation partner, usually companies do not know the basis on […]