Leading Software Development Organization
Best training I’ve attended and would recommend it to others. Trainers were excellent – very friendly, made the training really interesting and interactive. With the…
Leading Software Development Organization
Best part of training was quality of trainers, tools and lab environment. Beneficial for carrying out PT and VA internally. Special session on 6th day,…
Leading Software Development Organization
Practical session was very interactive and helpful to understand real life scenarios.
Leading Security Consulting Company
It was a great enlightenment by achieving knowledge in various aspects of ethical hacking. The point of view towards hacking has improved with enhanced knowledge.
Legal Consultancy Organization
Varutra has been our security partner of choice for the past 2 years in a row. Varutra’s passion for information security makes them a very…
Leading Consultancy Organization
Varutra has proved to be a good partner in helping secure our network and systems. In today’s highly dynamic and even evolving security scenario it…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (23)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (3)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (42)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (43)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)