Guide to Web Application Penetration Testing
Guide to Web Application Penetration Testing

We have covered the process of Penetration Testing in other … Read More
What to expect from the New York Privacy Act?
What to expect from the New York Privacy Act?

In the recently proposed bill of the New York Privacy … Read More
Guide On ISO 27001 Controls
Guide On ISO 27001 Controls

ISO 27001 or ISO/IEC 27001:2013 is an international standard created … Read More
Everything you need to know about ISO 27001 Standards
Everything you need to know about ISO 27001 Standards

The International Organization for Standardization (ISO) is a global organization … Read More
Do we need a CPA firm for SOC Attestation?
Do we need a CPA firm for SOC Attestation?

Emerging technology and growing trends of outsourcing critical business operations … Read More
RBI to set stringent rules to regulate the Digital Payment Security Controls
RBI to set stringent rules to regulate the Digital Payment Security Controls

Given the proliferating cybercrimes in the Banking and Financial industry, … Read More
Why is GDPR Risk Assessment essential for Compliance?
Why is GDPR Risk Assessment essential for Compliance?

Organizations looking to achieve GDPR Compliance are required to conduct … Read More
PCI SAQ – What is it and to whom it applies?
PCI SAQ – What is it and to whom it applies?

  Transcript Hello and welcome to our next in line … Read More
PCI Compliance Levels for Merchants & Service Providers
PCI Compliance Levels for Merchants & Service Providers

The Payment Card Industry Data Security Standard (PCI DSS) outlines a set … Read More
What is GDPR Data Flow Mapping?
What is GDPR Data Flow Mapping?

Data Privacy laws around the world have levied stringent obligations … Read More
GDPR data breach fines & penalties
GDPR data breach fines & penalties

  The General Data Protection Regulation Act is a law … Read More
HIPAA Compliance Challenges and Ways to tackle them
HIPAA Compliance Challenges and Ways to tackle them

Maintaining compliance has always been a huge challenge for most … Read More
Revised Technology Risk Management Guidelines released by MAS
Revised Technology Risk Management Guidelines released by MAS

In the wake of growing cyber-attacks in recent years which … Read More
What does the SOC2 Report cover?
What does the SOC2 Report cover?

Businesses often outsource services related to information technology and cloud … Read More
Why is PCI DSS Training Important?
Why is PCI DSS Training Important?

Credit cards and debit cards provide great convenience to consumers … Read More
Why should merchants hire a QSA company and what should be the criteria for hiring?
Why should merchants hire a QSA company and what should be the criteria for hiring?

PCI DSS Compliance is a standard that provides a well-curated … Read More