Category : Informative

Security QA Testing
A secure web application development process should always apply security QA testing checkpoints and techniques during the early stages of development...
READ MORE
Compromise Assessment: Find the adversary inside
A compromise assessment is a comprehensive review of an organization with one objective inquiry – have we been compromised? In other...
READ MORE
AD Password Audit: Secure Your Organization
When it comes to cyber security for critical business resources and data, passwords remain the most common and most favoured system...
READ MORE
Red Team vs Blue Team vs Purple Team
Regardless of the size or industry of an organization, one of the most effective ways to discover infrastructure vulnerabilities and prevent...
READ MORE
Proactive Risk Assessment vs Reactive Risk Assessment
Theoretically speaking, when it comes to the subject of cybersecurity, there are two types of risk assessment – proactive risk assessment...
READ MORE
Third-Party Risk Management
Instagram, Marriott and General Electric all have one thing in common this year, they have experienced data breaches as a direct...
READ MORE