Remote Assessments & Corona Virus
Remote Assessments & Corona Virus

Guidelines from PCI SSC has been issued for the very … Read More
Types of Social Engineering Attacks
Types of Social Engineering Attacks

In social engineering, an attacker gathers information by interacting with … Read More
Local File Inclusion (LFI)
Local File Inclusion (LFI)

What is Local file inclusion (LFI)? File Inclusion attack is … Read More
Webinar On: “Personal Data Protection Act (PDPA) compliance”-A step by step approach”
Webinar On: “Personal Data Protection Act (PDPA) compliance”-A step by step approach”

  Data ‘hacks’ and data privacy breaches of well-known companies … Read More
Mobile Application Security
Mobile Application Security

Nowadays Mobile device has evolved from simple communication devices to … Read More
Top 11 Benefits of having SOC 2 Certification!
Top 11 Benefits of having SOC 2 Certification!

SOC 2 Certification is today the need of the industry … Read More
Selecting SOC 2 Principles
Selecting SOC 2 Principles

Listen Audio Version   Once you as an organization are … Read More
SOC 1 Vs SOC 2 Report
SOC 1 Vs SOC 2 Report

  Listen Audio Version   Which SOC Report Do I … Read More
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?

A firewall risk assessment is a detailed assessment approach of … Read More
WHY SHOULD I DO SOC 2?
WHY SHOULD I DO SOC 2?

Listen Audio Version   Interesting question and rightly so… it’s … Read More