This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment…
Author: Prashant
Difference Between SOC2 Type I and Type II Reports
What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service…
GDPR Compliance for Mobile Apps
GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address….
Ensuring Information Security During COVID-19 Pandemic
While the whole world is worried about corona virus pandemic, there are other set of problems organisations are facing. Everyone is worried about information security…
Bank Application Cyber Security – Not A Child’s Play
While providing consultancy on cyber security, I am often asked a question by bank’s senior IT management — Why our application VAPT should be different…
Top 5 Reasons To Perform VAPT Of Your Web Application
I guess most of us know why a vulnerability assessment and penetration testing needs to be performed for web apps or mobile apps. Lately I…
Tips To Implement GDPR For SaaS Based Products
While there are many companies going for or considering GDPR implementation after 25th May 2018, there are a bunch of those who are still contemplating…
Mobile Apps: Owner’s Pride, Hacker’s Gain
Did you know that a mobile application, on an average has 9 vulnerabilities? Multiply that by the average number of installed applications (26.2) and you…
Vulnerability Assessment – Automated v/s Manual Testing
We all know that there are 3 distinct pillars of software testing – functional testing, security testing and performance testing. There are multiple tools out…
Why Hackers Like The Healthcare Industries
To the question in title, if I was a hacker I would ask myself “why not”?. Its simple really. Hackers always go for the data…