Roadmap to FedRAMP Compliance

4 years ago

The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server…

Insecure Direct Object Reference (IDOR)

4 years ago

What is an Insecure Direct Object Reference (IDOR) Risk?  IDOR stands for Insecure Direct Object Reference occurring when an application…

Port Forwarding – Pivoting and Tunneling

4 years ago

Port forwarding is a key activity in any network security testing. Once we get an initial foothold into the victim…

IT Security Controls

4 years ago

IT security controls play a foundational role in shaping the efforts security professionals take to protect an organization. Security Controls…

Adware – New Age Weapon

4 years ago

Are you seeing ads every time while browsing the web and it is asking you to install software or enter…

Cyber Law in INDIA

4 years ago

In this article we will see in detail overview of Cyber Law in India and various sections of IT Act…

DROZER – Android Security Assessment Framework

4 years ago

Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security…

ASSET SECURITY

4 years ago

When we think of asset security, at the first glance it looks pretty simple. After all, what is the big…

Covid 19 and Business Continuity Planning

4 years ago

COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic to Avoid Cyber Risks for…

Essentials of Third Party Risk Management (TPRM)

4 years ago

Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate…