Research & Technology

search
post blog image

Mastering Cyber Incident Reporting: Simplifying...

In today's digital era, cyber incidents pose a significant threat to businesses worldwide. Cyber incident reporting is the systematic process of collecting, documenting, and communicating information...

+ Read More
post blog image

Simplifying Cyber Incident Response: From...

Cyberspace, characterized by its borderless nature, has witnessed an alarming surge in cyberattacks. These attacks have evolved to become more precise, intricate, and relentless, posing an...

+ Read More
post blog image

Using DVWS for API Security – SQL Injection

With advancing web technologies, APIs play a crucial part in application architecture. APIs, if not tested properly, can lead to serious security vulnerabilities. DVWS or Damn Vulnerable Web Services...

+ Read More
post blog image

Security – Processes built around solutions and...

The Big Question Asked ” Mohit, a ZERO DAY VULNERABILITY ” how can you discover something which is unknown? You expect us to believe there is a Zero Day and our Perimeter security devices cannot...

+ Read More
post blog image

Security – Processes built around solutions and...

Every time  I meet a client to discuss Cyber Security and its importance the replies are mostly like ” I have the best firewall etc. so I am secured. So why do I need to worry about security as my...

+ Read More