Data Privacy

ISO 27017- Information Security Control for Cloud Services

The use of cloud services is increasing worldwide as industries continue to grow. With this dynamic growth in cloud technology,…

3 years ago

Let’s Protect Your Organization From Insider Threats

Among various cyber threats that organizations face, insider threats are the ones that are hard to detect. However, not all…

3 years ago

ASSET SECURITY

When we think of asset security, at the first glance it looks pretty simple. After all, what is the big…

3 years ago

Misconfigured Cross-Origin Resource Sharing (CORS) Risk

The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between…

3 years ago

Database Configuration Audit for Security and Compliance [Part-1]

Database Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases…

3 years ago

PA DSS V 3.2 to SUNSET by 2022

About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is…

3 years ago

Privacy Now to be a Fundamental Right in India

Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT…

3 years ago

Zooming Security Vulnerabilities [Part – 2]

This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!  …

4 years ago

Zooming Security Vulnerabilities [Part – 1]

Diving into Zoom Security Vulnerabilities [Part – 1]   Introduction - Zoom is a popular web-based video-conferencing application available to…

4 years ago

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…

5 years ago