Did you know that a mobile application, on an average has 9 vulnerabilities? Multiply that […]
Vulnerability Assessment – Automated v/s Manual Testing
We all know that there are 3 distinct pillars of software testing – functional testing, […]
Why Hackers Like The Healthcare Industries
To the question in title, if I was a hacker I would ask myself “why […]
Why Manufacturing Industry is Prone to Ransomware Attacks
2017 was clearly an year of ransomwares. We saw Locky, Petya, GoldenEye, Wannacry and their […]
Learnings From The Cyber Attacks on Banking Industry
Year 2018 was full of cyber-attacks and the most serious news was about well-orchestrated cyber-attacks […]
How To Select Your ISO 27001 Implementation Partner
While choosing ISO27001 consultant or implementation partner, usually companies do not know the basis on […]
Considering ISO27001 for IoT Security Readiness
Manufacturing companies are heading towards IoT (Internet of Things) in a fast pace. While most […]
IOT Vulnerability Assessment using Raspberry Pi2
IOT Vulnerability Assessment and Penetration Testing IOT, which is a buzzword in many business industries […]
ISO 27017 & ISO 27018 Compliance Documentation
Cloud services offer great scalability and flexibility. However, for a company, the adoption of cloud […]
SQL Injection Attack Via ORM Sink
Test cases for SQL Injection via ORM Sink What is an SQL injection? SQL injection […]