• Join us at GISEC Global ,Dubai World Trade Centre - Hall No.3, Booth No. F46 ! Upcoming Event

Research & Technology

search
post image

Simplifying Cyber Incident Response: From...

Cyberspace, characterized by its borderless nature, has witnessed an alarming surge in cyberattacks. These attacks have evolved to become more precise, intricate, and relentless, posing an...

+ Read More
post image

Using DVWS for API Security – SQL Injection

With advancing web technologies, APIs play a crucial part in application architecture. APIs, if not tested properly, can lead to serious security vulnerabilities. DVWS or Damn Vulnerable Web Services...

+ Read More
post image

Security – Processes built around solutions and...

The Big Question Asked ” Mohit, a ZERO DAY VULNERABILITY ” how can you discover something which is unknown? You expect us to believe there is a Zero Day and our Perimeter security devices cannot...

+ Read More
post image

Security – Processes built around solutions and...

Every time  I meet a client to discuss Cyber Security and its importance the replies are mostly like ” I have the best firewall etc. so I am secured. So why do I need to worry about security as my...

+ Read More