by Binoy KL | Mar 17, 2012 | Corporate Security
Many organizations engage with third party vendors for performing Vulnerability Assessments and Penetration Testing. Small organizations are doing this out of the compliance requirements or genuine security considerations. It is not necessary that the person...
by Binoy KL | Dec 28, 2011 | Corporate Security, Cyber Warfare, Data Protection
Stratfor, a global security think-tank, is hacked and now everyone knows about it. Based on the information available on the web related to this recent security incident, it may be safe to consider that the Information Security processes at the said company was not...
by Binoy KL | Dec 23, 2011 | Application Security, Security Tools
In this post I am listing a set of vulnerable web applications publicly made available for the purpose of security testing and training. Google Gruyere for Web Application Exploits and Defences: A Python application with lots of bugs deliberately setup for web...
Recent Comments