Jemima

Jemima

What is the ideal web session timeout?

One of our customers for whom we had performed Mobile App VAPT asked us, what should be the ideal session timeout for their FinTech App? The answer to this question actually depends of how you answer the below questions– 1.…

How pentesting differs in various operating systems?

Different operating systems are based upon different ideologies. Linux based operating systems like Kali, Parrot OS, Backbox Linux are specifically made with certain inbuilt tools, which helps the pentesters to work easily and with better grasp. On the other hand,…

What are the 4 types of IT security?

Every organization has some data to protect. The data, if stolen can cause huge damage to an organization both reputational and financial. Hence, it becomes vital to secure all the paths via which one can access data. Here is when…

What are major cyber security risks?

Cyber security risk is a risk that could potentially harm the confidentiality, integrity and availability of the data through an attack either on asset, network or an application. Most common cyber security risks are as below- Ransomware: The ransomware attack…

Patch management tricks and techniques

I. What is a patch? In technical terms, “Patch” are the changes performed on a computer program/software to enhance its security shield against newly rising cyber-attacks. In simple terms, we can also refer to them as software updates that includes…

Top Threats In Cloud Security

“Top Threats to Cloud Computing”, provides needed background to help organizations in making refined risk management decisions regarding their cloud adoption strategies. #Threat1- Misuse of cloud computing: PaaS providers have usually suffered most from this type of attacks. Recent evidence…