Metrics For Your Information Security Solutions
Recently, on one of the security mailing lists a query was posted as to what metrics should be produced from a […]
Recently, on one of the security mailing lists a query was posted as to what metrics should be produced from a […]
Heartbleed Advisory & FAQ Please find below a quick FAQ on the Heartbleed vulnerability and what you can to address […]
Web Application security has become the biggest concern for almost all organizations who wish to bring their business to the […]
On the 2nd of July 2013, the Indian Government formally approved and published the National Cyber Security Policy (NCSP). The policy […]
In an earlier blog post I had published the summary of our findings of a malware analysis done, which had […]
In early 2012, a client contacted us with suspicious-looking emails that he had received. There were two emails received by […]
Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or […]
Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing […]