Manufacturing companies are heading towards IoT (Internet of Things) in a fast pace. While most […]
IOT Vulnerability Assessment using Raspberry Pi2
IOT Vulnerability Assessment and Penetration Testing IOT, which is a buzzword in many business industries […]
ISO 27017 & ISO 27018 Compliance Documentation
Cloud services offer great scalability and flexibility. However, for a company, the adoption of cloud […]
SQL Injection Attack Via ORM Sink
Test cases for SQL Injection via ORM Sink What is an SQL injection? SQL injection […]
SOC 2 FOR SERVICE ORGANISATIONS
SOC for Service Organizations reports are designed to help service organizations that provide services to […]
Cyber Forensics – Active Directory Investigation
In an industry running on Active Directory, if there is an espionage that needs to […]
Cyber Security Definitions
Confidentiality is the term used to describe information/data privacy which means the information is not […]
HIPAA Compliance for Mobile Apps
HIPAA Compliance for Mobile Apps With lots of mobile apps handling or processing PHI (Personal […]
Cloud Fundamentals and Cyber Security Assessment -4
Major attacks • Back-door: A back-door attack takes place using asynchronous external connections or dial-up […]
Cloud Fundamentals and Cyber Security Assessment -3
Security threats 1. Misuse of Cloud Computational Resources: In order to conduct cyber-attacks on computer […]