ISO 27017- Information Security Control for Cloud Services
The use of cloud services is increasing worldwide as industries continue to grow. With this dynamic growth in cloud technology, issues of security arise. Businesses…
Let’s Protect Your Organization From Insider Threats
Among various cyber threats that organizations face, insider threats are the ones that are hard to detect. However, not all insider threats are malicious as…
ASSET SECURITY
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big deal about tracking a few…
Misconfigured Cross-Origin Resource Sharing (CORS) Risk
The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between websites, served on different domains,…
Database Configuration Audit for Security and Compliance [Part-1]
Database Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to produce and store a…
PA DSS V 3.2 to SUNSET by 2022
About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is a global security standard that…
Privacy Now to be a Fundamental Right in India
Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT Act Amendment 2008, and therefore…
Zooming Security Vulnerabilities [Part – 2]
This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities! 1. Ensure the Host can…
Zooming Security Vulnerabilities [Part – 1]
Diving into Zoom Security Vulnerabilities [Part – 1] Introduction – Zoom is a popular web-based video-conferencing application available to be installed on computer systems…
Zero Knowledge Proof
Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential to increase privacy and security…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (22)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (1)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (34)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (42)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)