Test cases for SQL Injection via ORM Sink What is an SQL injection? SQL injection (SQLi) is a major or one of the top OWASP…
Author: Prashant
SOC 2 FOR SERVICE ORGANISATIONS
SOC for Service Organizations reports are designed to help service organizations that provide services to other entities, build trust and confidence in the service performed…
Cyber Forensics – Active Directory Investigation
In an industry running on Active Directory, if there is an espionage that needs to be investigated, a critical analysis of AD settings is important….
Cyber Security Definitions
Confidentiality is the term used to describe information/data privacy which means the information is not made available or disclosed to unauthorized entities or individuals. Integrity…
HIPAA Compliance for Mobile Apps
HIPAA Compliance for Mobile Apps With lots of mobile apps handling or processing PHI (Personal Health Information), the HIPAA (Health Insurance Portability and Accountability Act)…
Top 5 Web Predictions for Year 2020
We at Valency Networks, keep on studying various attack patters, while performing application security penetration testing for our customers. We also keep an eagle’s eye…
FedRAMP Cyber Security Certification 5
Q. What is FedRAMP? A. The Federal Risk and Authorization Management Program (FedRAMP) is a US government program that provides a unique approach toward security…
FedRAMP Cyber Security Certification 4
Goals and Benefits of FedRAMP The Goals of FedRAMP are to 1. Ensure use of cloud services adequately protects and secures federal information. 2. Enable…
FedRAMP Cyber Security Certification 3
FEDRAMP SECURITY ASSESSMENT FRAMEWORK FedRAMP SAF is compliant with FISMA and is based on NIST Special Publication 800- 37. Federal Agencies are needed to assess…
FedRAMP Cyber Security Certification 2
FedRAMP Features: FedRAMP was created out of the Federal Cloud Computing Initiative to remove the barriers to the adoption of the cloud. • Cloud computing…