• VISTA InfoSec
    VISTA InfoSec
    WELCOME TO
    VISTA InfoSec

    VISTA InfoSec

    Trusted Advisors, Assured Compliance.
  • assurance
    Compliance
    Compliance

    Equipping you with a strong BAU
    posture for InfoSec compliance;
    be it PCI DSS, ISO27001, Business Continuity,
    or HIPAA, we are there for you.

    Equipping you with a strong BAU
    posture for InfoSec compliance;
    be it PCI DSS, ISO27001,
    Business Continuity,
    or HIPAA, we are there
    for you.

  • security
    SECURITY MANAGEMENT
    SECURITY MANAGEMENT

    Right from Vulnerability Assessment/Penetration Testing
    to Web/Mobile application assessment and Static Code
    Analysis, we are there with you to help you ensure that
    your precious assets and data is not hacked or ransommed.

    Right from Vulnerability Assessment/Penetration Testing
    to Web/Mobile application assessment and Static Code
    Analysis, we are there with you to help you ensure that
    your precious assets and data is not hacked or ransommed.

  • advisory
    I.T. ADVISORY
    I.T. ADVISORY

    We navigate complex environments to help you
    achieve maximum value for your technology
    decisions, architecture and security projects.

    We navigate complex environments to help you
    achieve maximum value for your technology
    decisions, architecture and security projects.

  • training
    TRAINING
    TRAINING

    InfoSec or Cyber security awareness / training services for your
    management or your personnel; training services customised
    for your organisation including road shows and social engineering
    tests.... moving beyond the classrooms. For upcoming Compliance
    professionals looking to make a career in InfoSec Compliance,
    we have “Academia Compliance”...

    InfoSec or Cyber security awareness / training services
    for your management or your personnel; training
    services customised for your organisation including
    road shows and social engineering tests.... moving
    beyond the classrooms. For upcoming Compliance
    professionals looking to make a career in InfoSec
    Compliance, we have “Academia Compliance”... give it a dekko

  • certification
    CERTIFICATION
    CERTIFICATION

    Accredited and acceptable Certifications for a host of
    Compliance requirements; be it regulatory or statutory
    or simply a business requirement, we are there with you.

    Accredited and acceptable Certifications for a host of
    Compliance requirements; be it regulatory or statutory
    or simply a business requirement, we are there with you.



June 26, 2019 - Two US cities opt to pay $1m to ransomware operators  |  June 24, 2019 - Google Calendar Being Used For Phishing: How To Stay Safe From This Hack  |  June 24, 2019 - Google Calendar Being Used For Phishing: How To Stay Safe From This Hack  |  June 23, 2019 - Heads-up] The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike Backs  |  June 23, 2019 - The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike Backs  |  June 21, 2019 - Backdoor Built into Android Firmware  |  June 15, 2019 - RBI asks banks to grout ATMs to wall, pillar or floor to enhance security.  |  June 11, 2019 - Microsoft Warns of Large Spam Campaign Hitting Europe (InfoRiskToday)  |  June 10, 2019 - MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge  |  June 09, 2019 - Cryptocurrency Company Hacks Itself Before Hackers Can Hack It  |  June 09, 2019 - Germany: Backdoor found in four smartphone models; 20,000 users infected (ZDNet)  |  June 07, 2019 - Baltimore Ransomware Attack Costing City $18 Million (InfoRiskToday)  |  June 07, 2019 - Ransomware succeeds because targets don’t learn from history  |  June 06, 2019 - BlueKeep Bug: Even NSA Wants You To Install Windows Updates  |  June 06, 2019 - The Cybersecurity 202: Trump’s ban on U.S. companies supplying Huawei will not make the country safer, experts say  |  June 05, 2019 - How to Protect Yourself or Your Business from Ransomware in 2 Steps  |  June 05, 2019 - How to Protect Yourself or Your Business from Ransomware in 2 Steps  |  June 01, 2019 - Ransomware isn’t just a big city problem  |  May 30, 2019 - PHP Security Guide  |  May 29, 2019 - Microsoft’s Election Guard a Trojan Horse for a Military-Industrial Takeover of US Elections  |  May 09, 2019 - What is phishing?  |  May 09, 2019 - Free IT Security Tools  |  April 21, 2019 - When Your Sandbox Fails  |  April 18, 2019 - Email – From Novelty to Nefarious  |  April 18, 2019 - Better protection against Man in the Middle phishing attacks  |  April 17, 2019 - Cyberspies Hijacked the Internet Domains of Entire Countries  |  April 16, 2019 - Bad security hygiene still a major risk for enterprise IT networks  |  April 16, 2019 - Is your DDos Mitigation Strategy Terabit-Proof?  |  April 08, 2019 - Data breach legislation proposes jail time for CIO, HR execs  |  April 07, 2019 - Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak (SecurityWeek)  |  April 01, 2019 - Sacked IT guy annihilates 23 of his ex-employer’s AWS servers  |  March 23, 2019 - Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’  |  March 20, 2019 - Google hit with €1.5bn fine from EU over advertising  |  March 18, 2019 - Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using IMAP Protocol  |  March 14, 2019 - Times Internet's lifestyle websites are offline in Europe due to GDPR non-compliance  |  March 14, 2019 - The 3 Most Common Social Engineering Cyber Attacks  |  March 13, 2019 - 76% Indian businesses hit by cyberattacks: Sophos’ EDR survey  |  March 11, 2019 - PayPal, Square vulnerabilities impact mobile point-of-sale machines  |  March 09, 2019 - Israeli cyberattack firm woos investors amid a human rights firestorm  |  March 06, 2019 - Nearly 70 percent of organizations have understaffed Cybersecurity teams: ISACA  |  March 06, 2019 - Huawei a threat, deeply tied to Chinese intel:US  |  March 02, 2019 - RBI slaps fine on four banks  |  March 01, 2019 - 40% of malicious URLs were found on good domains  |  February 28, 2019 - Webinar - New Kid on the block - SOC for Cybersecurity  |  February 27, 2019 - Retailers have become the top target for credential stuffing attacks  |  February 26, 2019 - Most IoT devices are being compromised by exploiting rudimentary vulnerabilities  |  February 22, 2019 - Russian hackers can breach an entire computer network in 18 minutes  |  January 24, 2019 - Webinar - Designing your Cyber Security framework using NIST guidelines Timing: 4.30 to 5.10 IST & BST :2.00 to 2.40 EST  |  December 15, 2018 - Sebi eases norms around cyber security ops for small market intermediaries  |  December 14, 2018 - Predicting cyberattacks: the need for new cyber security tools  |  December 13, 2018 - Three cybersecurity tips to help train your employees Advice, Technology Dec  |  December 12, 2018 - Cybersecurity, trade tensions rank as top threats to markets in 2019, survey finds  | 

News