Threat Management
-
Static Code Analysis for Enterprise Applications
By Manoj Rai On 6 Jul 2015The increase in adoption of Social, Mobile, Analytics, and Cloud (SMAC) technologies and growth in data volumes has led to increased concerns about data security. With large enterprises building or deploying new applications using public cloud platforms, there are doubts...
-
Why it is critical to pen test your ERP system
By Manoj Rai On 6 Jul 2015An ERP system is really at the heart of any organization. It enables and facilitates all critical business processes human resources management, financial planning, product management, and more. More importantly, it holds all the data critical to the organization financial...
-
The Critical Need for an Architecture and Design Review
By Manoj Rai On 6 Jul 2015The security of an application, network or operating system, and their associated functionalities relies primarily on their architecture and design. Which is why an Architecture and Design review is critical in helping you analyze and validate your organization's overall security....
-
5 Reasons Why Your Pen Test Should Combine Manual and Automated Testing
By Manoj Rai On 21 May 2015When it comes to penetration testing, there are any number of automated tools available in the marketplace—both the high-priced sophisticated lot, and their inexpensive counterparts that are just about adequate. However, the ideal pen test is more than just a...
-
The Foolproof Penetration Testing Checklist
By Manoj Rai On 11 May 2015Penetration testing, or pen testing as it is popularly called, is a critical component of any Threat Management Solution. It is now increasingly accepted as an effective method of detecting vulnerabilities in your network, applications and infrastructure. In a pen...
Tag Cloud
Subscribe for blog updates