A brief introduction to HIPAA Compliance
A brief introduction to HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 which … Read More
CCPA Compliance Guide
CCPA Compliance Guide

The California Consumer Privacy Act (CCPA) is the first of … Read More
NESA’s Compliance Enforcement and Penalties
NESA’s Compliance Enforcement and Penalties

NESA Standards have been developed based on the existing standards … Read More
Brief Insight on what is NESA Compliance
Brief Insight on what is NESA Compliance

Advancement in the field of Information Technology has radically transformed … Read More
NESA’s IAS Standards & Security Controls
NESA’s IAS Standards & Security Controls

The National Electronic Security Authority (NESA) was established in 2012 … Read More
Government brings Cooperative banks under RBI supervision for better regulation
Government brings Cooperative banks under RBI supervision for better regulation

The Indian Banking Industry has drastically revolutionized and achieved new … Read More
SOC2 vs ISO 27001 Certification
SOC2 vs ISO 27001 Certification

When it comes to Information Security, companies struggle with the … Read More
PCI DSS Scoping and Segmentation
PCI DSS Scoping and Segmentation

Listen The Audio Version   PCI DSS Security Standards have … Read More
Google face lawsuit in U.S. for tracking private internet use
Google face lawsuit in U.S. for tracking private internet use

In the recent years, data privacy lawsuits have been made … Read More
SOC 2 Type 1 vs Type 2
SOC 2 Type 1 vs Type 2

  The prevalence of cyber security attacks and data breach … Read More
Insight on the BHIM data breach case
Insight on the BHIM data breach case

In the recent few months, apart from the Corona Virus … Read More
Types of Penetration test
Types of Penetration test

Penetration test or Pen test as we call it, is … Read More
Social Engineering: How to Recognize Phishing Emails
Social Engineering: How to Recognize Phishing Emails

According to Wikipedia, Social engineering, in the context of information … Read More
PCI PIN – A Quick Intro
PCI PIN – A Quick Intro

The Payment Card Industry Security Standards Council (PCI SSC), published … Read More
Remote Assessments & Corona Virus
Remote Assessments & Corona Virus

Guidelines from PCI SSC has been issued for the very … Read More
Types of Social Engineering Attacks
Types of Social Engineering Attacks

In social engineering, an attacker gathers information by interacting with … Read More