This article explains the difference between a static and dynamic web page, mainly from vulnerability assessment and penetration testing perspective. From vulnerability assessment perspective, a dynamic page is of two types. In first case consider a page that needs user Read more…
SYNOPSIS Valency Networks is committed to track the cyber attacks. While catering to our customers for cyber security services we end up gaining a huge amount of insights. This is primarily possible via the vulnerability assessments and cyber forensic services. Read more…
So, you are trying to onboard a new customer, a customer who you have been going after for a while, a customer who can bring good fortune to the organization and then when you are almost certain that the deal Read more…
Penetration testing is performed on Win 7, Win Server 2008, Ubuntu form Kali being the attacker. All the Penetration test is performed on the Virtual machine by creating a test lab environment setup Win7, Win Server 2008 and Ubuntu on Read more…
Introduction If you work in the field of Infosec, you have probably heard of Vulnerability Assessment (VA). VA is a process of identifying security vulnerabilities in a system. Imagine a burglar looking for and identifying different entrances to your building, Read more…
Soon when the world went in lockdown during pandemic all the business around world made strategies to ensure business continuity and not many but few focused their efforts on security as well. During pandemic all IT and non-IT industries focused Read more…
While providing cyber security services such as VAPT and compliances, we come across many customers. Most of those are either IT heads or CxO’s. Not all of those are aware about the world of cyber security, and they have their Read more…
Cyber Security Myth Debunked – More than one antivirus help the infrastructure to be secure
Fact : It can be more harmful than a help if two separate antivirus are running on the system. Year:2015 Said by “IT Admin of a mid-size Manufacturing company” “We used to be worried about cyber security but not anymore. Read more…
Fact : PHP or .NET are not secure by default. Its IT person’s skill to secure those. Year:2014 Said by “CTO of an IT product company” “The sole reason we chose PHP over .Net is because PHP is most secure Read more…
Fact : Physical security is a small component of the big IT infrastructure security puzzle. Many more controls are needed to achieve better data security Year:2013 Said by “IT head of a large scale Manufacturing company” “Thanks for visiting us Read more…