How ISO 27001 will make your Cloud Secure? Having a Cloud environment is becoming simpler day by day. But Management, Expansion, Monitoring, Regulating, Controlling, Security…
HIPAA compliance for mobile application
HIPAA compliance for mobile application What is HIPAA? HIPAA (Health Insurance Portability and Accountability Act) sets the standard for protecting sensitive patient data. HIPAA ensures…
GDPR and it’s impact on privacy (new changes)
GDPR and its impact on privacy (new changes) You might be thinking – how does a EU regulation affect businesses in India and how we…
Fundamentals Of Security Headers
The notorious targets for all sorts of cyber attacks can be zeroed down to the web applications. The increasing pattern of cyber attacks has led…
Fundamentals Of SCADA Security – 4
Security threats to SCADA and RTU The SCADA systems which tie up together the decentralized facilities like; oil and gas pipelines, waste water collection, power…
Fundamentals Of SCADA Security – 3
Introduction to RTU The remote terminal unit abbreviated as RTU is an electronic device that is controlled through the use of a microprocessor. It helps…
Fundamentals Of SCADA Security – 2
Introduction to PLC Programmable logic controllers abbreviated as PLC are said to be industrial computers that help monitor inputs, make relevant decisions on the basis…
Fundamentals Of SCADA Security – 1
Introduction to SCADA Supervisory Control and Data Acquisition abbreviated as SCADA is regarded as a complete system constituting of hardware and software components that helps…
Firewall Policies Compliance
RCIE Course Modules: 3.8 Firewall Policies Compliance Firewall Policies compliance Having a strong firewall policy allows companies to stay compliant to best practices. From a…
Ethical Hacking Information Gathering
INFORMATION GATHERING ( REDHAWK ) USING KALI Basic Reconnaisance: GEO-IP LOOKING GRAB BANNERS: DNS LOOKUP: SUBNET CALCULATOR: NMAP PORT SCANNING: SUBDOMAIN: