
Business Impact Analysis – Getting it Right
Business Impact Analysis – Getting it Right Introduction It could be the devastating uncontrolled Australian bushfires or the series of […]
Business Impact Analysis – Getting it Right Introduction It could be the devastating uncontrolled Australian bushfires or the series of […]
[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their […]
Due to the current pandemic situation (COVID-19), most organizations have asked employees to start work from home (WFH), wherever possible. […]
PCI SSC Update – Remote Assessments PCI SSC Update – Remote Assessments We wanted to reach out to you to […]
Cybersecurity in the Cloud – a Shared Responsibility Model Cybersecurity in the Cloud – a Shared Responsibility Model As organizations […]
Cross-Origin Resource Sharing (CORS) What is CORS? CORS stands for Cross-Origin Resource Sharing, which manages cross-origin request. CORS is a […]
In the previous blog-post, we learned about the Tokens and Privileges which are assigned to the user by the system. […]
Token Manipulation Attacks INTRODUCTION In these series of blogpost, we are going to look at the Windows Token-based Attacks along […]
Robotic Process Automation Cybersecurity Robotic Process Automation Cybersecurity Use cases to apply robotics in cybersecurity There are several opportunities to […]
Securing and Auditing Remote Process Automation Securing and Auditing Remote Process Automation 1. Securing RPA: RPA introduces a new attack […]