With the on-going spread of Coronavirus [Covid-19] governments are forced to take strict steps putting around 20% of the world population under lockdown. Healthy individuals…
Ensuring Information Security During COVID-19 Pandemic
While the whole world is worried about corona virus pandemic, there are other set of problems organisations are facing. Everyone is worried about information security…
Bank Application Cyber Security – Not A Child’s Play
While providing consultancy on cyber security, I am often asked a question by bank’s senior IT management — Why our application VAPT should be different…
Top 5 Reasons To Perform VAPT Of Your Web Application
I guess most of us know why a vulnerability assessment and penetration testing needs to be performed for web apps or mobile apps. Lately I…
Tips To Implement GDPR For SaaS Based Products
While there are many companies going for or considering GDPR implementation after 25th May 2018, there are a bunch of those who are still contemplating…
Top Threats In Cloud Security
“Top Threats to Cloud Computing”, provides needed background to help organizations in making refined risk management decisions regarding their cloud adoption strategies. #Threat1- Misuse of…
Mobile Apps: Owner’s Pride, Hacker’s Gain
Did you know that a mobile application, on an average has 9 vulnerabilities? Multiply that by the average number of installed applications (26.2) and you…
Vulnerability Assessment – Automated v/s Manual Testing
We all know that there are 3 distinct pillars of software testing – functional testing, security testing and performance testing. There are multiple tools out…
Why Hackers Like The Healthcare Industries
To the question in title, if I was a hacker I would ask myself “why not”?. Its simple really. Hackers always go for the data…
Why Manufacturing Industry is Prone to Ransomware Attacks
2017 was clearly an year of ransomwares. We saw Locky, Petya, GoldenEye, Wannacry and their variants. The cases were pretty straight forward – Machines get…