What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service…
GDPR Compliance for Mobile Apps
GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address….
Important IT Network Security Guidelines During Coronavirus Pandemic
With the on-going spread of Coronavirus [Covid-19] governments are forced to take strict steps putting around 20% of the world population under lockdown. Healthy individuals…
Ensuring Information Security During COVID-19 Pandemic
While the whole world is worried about corona virus pandemic, there are other set of problems organisations are facing. Everyone is worried about information security…
Bank Application Cyber Security – Not A Child’s Play
While providing consultancy on cyber security, I am often asked a question by bank’s senior IT management — Why our application VAPT should be different…
Top 5 Reasons To Perform VAPT Of Your Web Application
I guess most of us know why a vulnerability assessment and penetration testing needs to be performed for web apps or mobile apps. Lately I…
Tips To Implement GDPR For SaaS Based Products
While there are many companies going for or considering GDPR implementation after 25th May 2018, there are a bunch of those who are still contemplating…
Top Threats In Cloud Security
“Top Threats to Cloud Computing”, provides needed background to help organizations in making refined risk management decisions regarding their cloud adoption strategies. #Threat1- Misuse of…
Mobile Apps: Owner’s Pride, Hacker’s Gain
Did you know that a mobile application, on an average has 9 vulnerabilities? Multiply that by the average number of installed applications (26.2) and you…
Vulnerability Assessment – Automated v/s Manual Testing
We all know that there are 3 distinct pillars of software testing – functional testing, security testing and performance testing. There are multiple tools out…