A Comprehensive Comparison of OWASP ZAP and Burp Suite Vulnerability Assessment Tools (Part 1) Introduction OWASP ZAP (Zed Attack Proxy) and Burp Suite are two…
Author: Prashant
Importance Of Cyber Security Threat Detection
In today’s digital age, the threat landscape is constantly evolving, making it crucial for individuals and organizations to prioritize threat detection. By staying one step…
Difference between PII and PHI and ePHI
PII, PHI, and ePHI are all related to data privacy and security, particularly in the context of sensitive information in various industries like healthcare and…
Go For ISO27001:2022 Immediately or Wait?
After almost 9 years, ISO27001 new version 2022 is released and I am not surprised that there is a big hoopla about it. Industry was…
Why ISO27001 Internal Audit Should Not Be CheckList Based?
All ISO27001 certified companies (not just compliant but certified) certainly have a stronger foot while competing for contracts and customers in the market. But being…
Comparison of Hardware and Software Firewall
What is a hardware firewall? A hardware firewall is a physical device much like a server that filters the traffic going to a computer. While…
What is dynamic web page for VAPT
This article explains the difference between a static and dynamic web page, mainly from vulnerability assessment and penetration testing perspective. From vulnerability assessment perspective, a…
Cyber Security Myth Debunked
While providing cyber security services such as VAPT and compliances, we come across many customers. Most of those are either IT heads or CxO’s. Not…
Cyber Security Myth Debunked – More than one antivirus help the infrastructure to be secure
Fact : It can be more harmful than a help if two separate antivirus are running on the system. Year:2015 Said by “IT Admin of…
Cyber Security Myth Debunked – PHP is more secure than .NET platform
Fact : PHP or .NET are not secure by default. Its IT person’s skill to secure those. Year:2014 Said by “CTO of an IT product…