Skip to content

Cyber Security Blog

Open Menu

Author: Prashant

14/04/2023

Go For ISO27001:2022 Immediately or Wait?

Compliance

After almost 9 years, ISO27001 new version 2022 is released and I am not surprised that there is a big hoopla about it. Industry was…

Prashant
02/11/2022

Why ISO27001 Internal Audit Should Not Be CheckList Based?

Compliance

All ISO27001 certified companies (not just compliant but certified) certainly have a stronger foot while competing for contracts and customers in the market. But being…

Prashant
07/01/2022

Comparison of Hardware and Software Firewall

VAPT

What is a hardware firewall? A hardware firewall is a physical device much like a server that filters the traffic going to a computer. While…

Prashant
13/12/2021

What is dynamic web page for VAPT

Web VAPT

What is a Dynamic Web Page in Terms of VAPT? When it comes to vulnerability assessment and penetration testing (VAPT), understanding the nature of web…

Prashant
28/01/2021

Cyber Security Myth Debunked

Technology

While providing cyber security services such as VAPT and compliances, we come across many customers. Most of those are either IT heads or CxO’s. Not…

Prashant
04/01/2021

Cyber Security Myth Debunked – More than one antivirus help the infrastructure to be secure

Technology

Fact : It can be more harmful than a help if two separate antivirus are running on the system. Year:2015 Said by “IT Admin of…

Prashant
04/01/2021

Cyber Security Myth Debunked – PHP is more secure than .NET platform

Technology

Fact : PHP or .NET are not secure by default. Its IT person’s skill to secure those. Year:2014 Said by “CTO of an IT product…

Prashant
04/01/2021

Cyber Security Myth Debunked – Physical Security Is Enough For Data Center

Technology

Fact : Physical security is a small component of the big IT infrastructure security puzzle. Many more controls are needed to achieve better data security…

Prashant
04/01/2021

Cyber Security Myth Debunked – Work From Home Does Not Require Internal Network Vulnerability Assessment

Technology

Fact : When teams work from home and connect to office network, the internal vulnerability assessment actually becomes more important than ever. Year:2020 Said by…

Prashant
04/01/2021

Cyber Security Myth Debunked – ISO27001 compliance can be implemented using a checklist

Technology

Fact : ISO27001 or any other compliance needs a detailed review of risks which cannot be captured using a mere checklist. Year:2019 Said by :…

Prashant

Posts navigation

Older posts
Newer posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3