Vulnerability Management in an Application Security WorldBy Khaleel Syed On 26 Feb 2014
Identification, assessment and reporting of security vulnerabilities in applications, databases, systems, networks and perimeters is the first step towards information security management to adhere with organizational policy, client requirements and applicable regulatory & legislative requirements. But with companies deploying more...
Prevent Vulnerabilities With Adequate TestingBy Khaleel Syed On 21 Feb 2014
Managing risks and information security is one of the key aspects of any organization, particularly for those dealing with sensitive and confidential information. Any breach or attack can not only cause them harm from a business perspective but also create...
Penetration testing – do’s and don’tsBy Khaleel Syed On 19 Feb 2014
Organizations invest heavily into security programs with the latest solutions and infrastructures; however, without testing there is no way to determine their effectiveness in case of an attack. Taking the most recent BBC example, where they had a server hacked...
Defending Malicious Attacks Through A Secure PlatformBy Khaleel Syed On 12 Feb 2014
Information is the lifeblood of global economy and any organization today is riding on this wild horse that is always threatened by security risks. As enterprises grapple with volumes of unstructured data through multifarious channels, the risks to information security...
These blogs might interest you
by Chetan Deshpande on 20 Aug 2018
by Sharon Andrew on 17 Aug 2018
by Sangram Sawant on 25 Jul 2018
by Rajiv Peddada on 22 May 2018
Subscribe for blog updates