HIPAA Compliance Framework – A Guide for Impleme ...
The Health Insurance Portability and Accountability Act (HIPAA) has set the standard for sensitive and critical patient healthcare data protection. Organizations that handle protected health…
Read MoreRoadmap to FedRAMP Compliance ...
The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server or hardware to process his…
Read MoreEssentials of Third Party Risk Management (TPRM) ...
Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate the adverse effects of risk…
Read MoreIntroduction to Information Security Management Sy ...
What is an Information Security Management System ? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational confidential…
Read MoreDatabase Configuration Audit for Security and Comp ...
Database Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to produce and store a…
Read MorePrivacy Now to be a Fundamental Right in India ...
Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT Act Amendment 2008, and therefore…
Read MoreCategories
- Android Security (17)
- Authentication & Authorization (21)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (5)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (11)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (29)
- Data Breaches (31)
- Data Leakage (25)
- Data Privacy (28)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (16)
- General (18)
- Governance Risk & Compliance (7)
- iOS Security (2)
- IOT Security (5)
- Java Security (2)
- Mobile Application Security (18)
- Mobile Device Management (10)
- Network Pentesting (8)
- News (48)
- Password Security (8)
- Past Events (6)
- Patch Management (3)
- Ransomware Attack (12)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (29)
- Security Best Practices (36)
- Security Hardening (32)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Upcoming Events (1)
- Viruses & Malware (14)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (32)
- Windows Mobile Security (1)
- Zero Day Attack (7)