Government brings Cooperative banks under RBI supervision for better regulation
Government brings Cooperative banks under RBI supervision for better regulation

The Indian Banking Industry has drastically revolutionized and achieved new … Read More
SOC2 vs ISO 27001 Certification
SOC2 vs ISO 27001 Certification

When it comes to Information Security, companies struggle with the … Read More
PCI DSS Scoping and Segmentation
PCI DSS Scoping and Segmentation

Listen The Audio Version   PCI DSS Security Standards have … Read More
Google face lawsuit in U.S. for tracking private internet use
Google face lawsuit in U.S. for tracking private internet use

In the recent years, data privacy lawsuits have been made … Read More
SOC 2 Type 1 vs Type 2
SOC 2 Type 1 vs Type 2

    The prevalence of cyber security attacks and data … Read More
Insight on the BHIM data breach case
Insight on the BHIM data breach case

In the recent few months, apart from the Corona Virus … Read More
Types of Penetration test
Types of Penetration test

Penetration test or Pen test as we call it, is … Read More
Social Engineering: How to Recognize Phishing Emails
Social Engineering: How to Recognize Phishing Emails

According to Wikipedia, Social engineering, in the context of information … Read More
PCI PIN – A Quick Intro
PCI PIN – A Quick Intro

The Payment Card Industry Security Standards Council (PCI SSC), published … Read More
Remote Assessments & Corona Virus
Remote Assessments & Corona Virus

Guidelines from PCI SSC has been issued for the very … Read More
Types of Social Engineering Attacks
Types of Social Engineering Attacks

In social engineering, an attacker gathers information by interacting with … Read More
Local File Inclusion (LFI)
Local File Inclusion (LFI)

What is Local file inclusion (LFI)? File Inclusion attack is … Read More
Webinar On: “Personal Data Protection Act (PDPA) compliance”-A step by step approach”
Webinar On: “Personal Data Protection Act (PDPA) compliance”-A step by step approach”

  Data ‘hacks’ and data privacy breaches of well-known companies … Read More
Mobile Application Security
Mobile Application Security

Nowadays Mobile device has evolved from simple communication devices to … Read More
Top 11 Benefits of having SOC 2 Certification!
Top 11 Benefits of having SOC 2 Certification!

SOC 2 Certification is today the need of the industry … Read More