Is that mobile app safe to use?

Would you readily give your residential address to a stranger? No? Aren’t you extra cautious while opening an email from an unknown sender? Yes? Good! How about extending the same sense of protection to your smart phone while downloading apps? In both these instances, you are necessarily safeguarding your home and yourself from prying eyes.…

Difference Between SOC2 Type I and Type II Reports

What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service to another organization show the effectiveness of their internal controls environment. A SOC 2 audit provides both detailed information and assurance of the service organization’s controls relevant to security, availability,…

GDPR Compliance for Mobile Apps

GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address. Or it can be as complex as their fingerprint details captured via mobile device and the app running on it. The GDPR compliance (General Data Protection Regulation) mandates that the…

Ensuring Information Security During COVID-19 Pandemic

While the whole world is worried about corona virus pandemic, there are other set of problems organisations are facing. Everyone is worried about information security challenges, especially when their entire work force is working from home, or at least a bigger part of it. This article talks about various possible ways a hacker can try…

Tips To Implement GDPR For SaaS Based Products

While there are many companies going for or considering GDPR implementation after 25th May 2018, there are a bunch of those who are still contemplating on what to do about it. GDPR is not as easy to implement as ISO 27001 and requires a very different approach. This is especially true and gets further complicated…

Mobile Apps: Owner’s Pride, Hacker’s Gain

Did you know that a mobile application, on an average has 9 vulnerabilities? Multiply that by the average number of installed applications (26.2) and you end up with an average of 235.8 vulnerabilities. In simple words, there are 235.8 ways for hackers to get inside your phone. Scary, huh? Hackers can get into your mobile…

Vulnerability Assessment – Automated v/s Manual Testing

We all know that there are 3 distinct pillars of software testing – functional testing, security testing and performance testing. There are multiple tools out there, to make tester’s life easy. While these automations are a important, there are few lacuna that a tester should be aware of, and this is especially true in case…