Fact : Its not the cost of firewall, but how you configure it securely is what matters the most Year : 2018 Said by :…
Author: Prashant
Cyber Security Myth Debunked – Linux is more secure than Windows
Fact : Linux and Windows both are equally insecure or secure. Year : 2017 Said by : IT head of a mid-size bank “We run…
Cyber Security Myth Debunked – Its Only In Hollywood Movies
Fact : Cyber Security is a reality and not a hoax. Year : 2015 Said by : IT Head of a Manufacturing company trying to…
Web VAPT Tools Comparison
WEB VAPT TOOLS COMPARISON Web Application VAPT is security testing methods for security holes or vulnerabilities in web applications and corporate websites. Due to these…
Network VAPT Tools Comparison
Network VAPT tools Comparison Network VAPT is the assessment procedure that is conducted by safety experts on the user’s network for identifying possible vulnerabilities that…
Why HIPAA and GDPR cannot replace each other
Why HIPAA and GDPR cannot replace each other? Its a misconception that GDPR and HIPAA can replace each other. Many companies misconstrue both the compliances….
Is that mobile app safe to use?
Would you readily give your residential address to a stranger? No? Aren’t you extra cautious while opening an email from an unknown sender? Yes? Good!…
Difference Between Web Based application and Cloud Based Application
This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment…
Difference Between SOC2 Type I and Type II Reports
What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service…
GDPR Compliance for Mobile Apps
GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address….