Latest Blog Post

Stay up to date with the latest news in IT Security.
Request a quote
25 Jun, 2019

The dilemma of choosing a web application security scanner: DAST, SAST, IAST, RASP, and what not.

When an application is being developed, one of the most difficult questions to be answered is how it should be tested…

Read More
22 Jun, 2019

Can Results from DAST (Dynamic Application Security Testing) be false positive?

A security analyst uses an array of tools to get the best results possible while testing the security of an..

Read More
19 Jun, 2019

Penetration Testing: Automated v. Manual

Previously, we have thoroughly discussed what penetration testing is and how it is different from vulnerability assessment, along with discussing penetration testing for SaaS companies as..

Read More
17 Jun, 2019

Network Penetration Testing Fundamentals

In the ever-evolving cyberspace when the hackers are extensively going after any organization irrespective of its size, it is important for an..

Read More
13 Jun, 2019

Application Security Testing Best Practices – Part II

In our last post, we talked about some basic best practices that must be followed while performing security testing activities..

Read More
10 Jun, 2019

Application Security Testing Best Practices – Part I

With cyber attacks increasing exponentially, security testing has become a necessity for organizations across the globe. Even if an organization has developed an application..

Read More
07 Jun, 2019

HIPAA and Penetration Testing – Part II

In the first part of this article, we discussed the basics of HIPAA along with the Privacy Rule and the..

Read More
03 Jun, 2019

HIPAA and Penetration Testing – Part I

HIPAA stands for the Health Information Portability and Accountability Act of 1996, and it was enacted by the US Congress and..

Read More
03 Jun, 2019

Vulnerability Assessment and Penetration Testing

Scenario 1: An organization develops an application and immediately deploys it without any testing. Same is true for the rest..

Read More
30 May, 2019

DAST v. SAST: Which one is better?

Earlier, security and privacy concerns were often used to be after-development activities, or they were ignored altogether. The ever-evolving threat..

Read More
1 2 3 4