Research & Technology

post image

Simplifying Cyber Incident Response: From Challenges to Solutions

Cyberspace, characterized by its borderless nature, has witnessed an alarming surge in cyberattacks. These attacks have evolved to become more precise, intricate, and relentless, posing an ever-inc...

+ Read More
post image

Using DVWS for API Security – SQL Injection

With advancing web technologies, APIs play a crucial part in application architecture. APIs, if not tested properly, can lead to serious security vulnerabilities. DVWS or Damn Vulnerable Web Servic...

+ Read More
post image

Security – Processes built around solutions and products Part 2

The Big Question Asked ” Mohit, a ZERO DAY VULNERABILITY ” how can you discover something which is unknown? You expect us to believe there is a Zero Day and our Perimeter security devices canno...

+ Read More
post image

Security – Processes built around solutions and products – part 1

Every time  I meet a client to discuss Cyber Security and its importance the replies are mostly like ” I have the best firewall etc. so I am secured. So why do I need to worry about security as ...

+ Read More