-
The Critical Need for an Architecture and Design Review
By Manoj Rai On 6 Jul 2015The security of an application, network or operating system, and their associated functionalities relies primarily on their architecture and design. Which is why an Architecture and Design review is critical in helping you analyze and validate your organization's overall security....
-
5 Reasons Why Your Pen Test Should Combine Manual and Automated Testing
By Manoj Rai On 21 May 2015When it comes to penetration testing, there are any number of automated tools available in the marketplace—both the high-priced sophisticated lot, and their inexpensive counterparts that are just about adequate. However, the ideal pen test is more than just a...
-
The Foolproof Penetration Testing Checklist
By Manoj Rai On 11 May 2015Penetration testing, or pen testing as it is popularly called, is a critical component of any Threat Management Solution. It is now increasingly accepted as an effective method of detecting vulnerabilities in your network, applications and infrastructure. In a pen...
-
The Importance of Black Box Testing
By Manoj Rai On 2 Mar 2015When testing software, it's necessary to employ a methodology that's as free from bias as possible. Development can be easily influenced by giving the tester too much information about the development process itself. The best-case scenario is that the tester...
-
Integrating Security into the SDLC
By Manoj Rai On 7 Nov 2014Guidelines to guard your SDLC Software security is increasingly becoming a matter of concern these days. Considering the fact that every software has become a common factor among any industry you can think of, securing it and enhancing its privacy...
Tag Cloud
Subscribe for blog updates