Many information security professionals, event at the senior level roles, are still getting the internal control...
Why we need Web application Security
In the initial days, attacks were focused on the network and operating system vulnerabilities. We have seen many such...
Cloud Service brokerage
Many organizations source cloud services from different vendors which introduces various challenges to business...
The rat race of vulnerability management
Patch management is one among the major IT Security concerns most of the organizations are worried about. It is...
Global Payments breach.initial review
Security breaches are become a common thing these days. They hit the front page only when the size or importance of...
PCI DSS compliance and Password policy
Usernames and passwords is still the major method of authenticating users to the systems. It would be difficult to...
Primos SQL Injection tool
Primos is web application security testing tool which is capable of performing discovery and exploiting the SQL...
Cloud solutions & PCI DSS Compliance
Businesses are increasing its dependence on cloud computing solutions. PCI DSS compliance is often a concern for many...
Google data center security
Found this interesting video in Youtube. It talks about the Google efforts on enforcing security across its data...
Vulnerability Assessment or Penetration Testing
Many organizations engage with third party vendors for performing Vulnerability Assessments and Penetration Testing....
Security Awareness Training Topics
Security Awareness is a key challenge in Implementing information security. Many organizations find it difficult to...
SQL Injection Tool.The Mole
The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the...
How long can CISO’s avoid Cloud Computing?
Cloud computing is gaining momentum in the business world. More and more business wants to increase their IT usage on...
Leadership.DDoS strategies
Distributed Denial of Service (DDoS) attacks are becoming very common these days. In the recent months, the hacktivist...
Anonymous @525,118
The Anonymous hacker collective twitter handle is being followed by more than half million people on twitter. All...
Kies Tray Agent . Unknown connections
Today while checking the network connections I found something strange. The KeisTrayAgent running on my PC is...
Outsourcing Information Security
Many a times when considering cost reduction, Information security outsourcing often come up for discussions. Can we...
Advanced Persistent Threat (APT)
Advanced persistent threat has made headlines when it hit big names like SONY, Symantec, RSA etc. APT is a stream of...
NIST guide for managing cloud security and privacy
Cloud computing is gaining its popularity in an accelerated mode and many businesses and government entities are...
Middle East Cyberwar a review
In the last two weeks, there is a lot of hacking events occurred in the middle east region. Supporters of two...