Cyber Security Webinar – Working From Home – Securing Workstations
Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.
Its All About Ethics
Its All About Ethics
Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.
Cyber Security Tips – Working From Home For Sysadmins Note – Enable sound – this video has an audio track.
This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment and penetration testing of each of the app types. The difference is simple really –…
Cyber Security Tips – Working From Home For HR And Admin Note – Enable sound – this video has an audio track.
What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service to another organization show the effectiveness of their internal controls environment. A SOC 2 audit…
GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address. Or it can be as complex as their fingerprint details captured via mobile device and…
With the on-going spread of Coronavirus [Covid-19] governments are forced to take strict steps putting around 20% of the world population under lockdown. Healthy individuals are asked to stay home, avoid gatherings and unnecessary travel to limit the spread of…
While the whole world is worried about corona virus pandemic, there are other set of problems organisations are facing. Everyone is worried about information security challenges, especially when their entire work force is working from home, or at least a…
While providing consultancy on cyber security, I am often asked a question by bank’s senior IT management — Why our application VAPT should be different than any other application VAPT? Isn’t it just a web app after all? I really…
I guess most of us know why a vulnerability assessment and penetration testing needs to be performed for web apps or mobile apps. Lately I had been asked by IT product development companies to put together the most critical drivers…