SOC for Service Organizations reports are designed to help service organizations that provide services to […]
Cyber Forensics – Active Directory Investigation
In an industry running on Active Directory, if there is an espionage that needs to […]
Cyber Security Definitions
Confidentiality is the term used to describe information/data privacy which means the information is not […]
HIPAA Compliance for Mobile Apps
HIPAA Compliance for Mobile Apps With lots of mobile apps handling or processing PHI (Personal […]
Cloud Fundamentals and Cyber Security Assessment -4
Major attacks • Back-door: A back-door attack takes place using asynchronous external connections or dial-up […]
Cloud Fundamentals and Cyber Security Assessment -3
Security threats 1. Misuse of Cloud Computational Resources: In order to conduct cyber-attacks on computer […]
Cloud Fundamentals and Cyber Security Assessment -2
Cloud Delivery Models In a IaaS model too, infrastructure is provided to run applications. The […]
Top 5 Web Predictions for Year 2020
We at Valency Networks, keep on studying various attack patters, while performing application security penetration […]
FedRAMP Cyber Security Certification 5
Q. What is FedRAMP? A. The Federal Risk and Authorization Management Program (FedRAMP) is a […]
FedRAMP Cyber Security Certification 4
Goals and Benefits of FedRAMP The Goals of FedRAMP are to 1. Ensure use of […]