Top 7 Cyber Security Measures That Enterprises Sho ...
India is considered the 3rd largest global hub with more than 5000 tech start-ups, and it is estimated that this number will grow 2.2x times…
Read MoreIntro to GraphQL – Attack Scenarios ...
Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing queries for preexisting data. It…
Read MorePA DSS V 3.2 to SUNSET by 2022 ...
About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is a global security standard that…
Read MoreThreat Modelling – Focused Defence for Moder ...
Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul information. It will help them…
Read MoreIntroduction to Secure Software Development Life C ...
The most effective way to reduce application security risk is to implement a formal development process that includes security best practices to avoid application vulnerabilities….
Read MoreCategories
- Android Security (17)
- Authentication & Authorization (21)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (5)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (11)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (25)
- Data Breaches (27)
- Data Leakage (24)
- Data Privacy (26)
- Email Phishing (7)
- Encryption & Cryptography (13)
- Ethical Hacking (15)
- General (14)
- Governance Risk & Compliance (6)
- iOS Security (2)
- IOT Security (5)
- Java Security (2)
- Mobile Application Security (18)
- Mobile Device Management (10)
- Network Pentesting (8)
- News (47)
- Password Security (8)
- Past Events (6)
- Patch Management (3)
- Ransomware Attack (10)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (29)
- Security Best Practices (33)
- Security Hardening (31)
- Social Engineering Attack (9)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Upcoming Events (1)
- Viruses & Malware (14)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (32)
- Windows Mobile Security (1)
- Zero Day Attack (7)