Say “YES” to Affordable, Smarter and Scalable Cyber Security Testing

Contact us today for a quote and sample report.
Request a quote
28 Jun, 2019

PCI DSS and Penetration Testing

The first version of the PCI DSS standard was released in 2004 for laying down the minimum security requirements when it comes to handling..

Read More
25 Jun, 2019

The dilemma of choosing a web application security scanner: DAST, SAST, IAST, RASP, and what not.

When an application is being developed, one of the most difficult questions to be answered is how it should be tested…

Read More
22 Jun, 2019

Can Results from DAST (Dynamic Application Security Testing) be false positive?

A security analyst uses an array of tools to get the best results possible while testing the security of an..

Read More
19 Jun, 2019

Penetration Testing: Automated v. Manual

Previously, we have thoroughly discussed what penetration testing is and how it is different from vulnerability assessment, along with discussing penetration testing for SaaS companies as..

Read More
17 Jun, 2019

Network Penetration Testing Fundamentals

In the ever-evolving cyberspace when the hackers are extensively going after any organization irrespective of its size, it is important for an..

Read More
13 Jun, 2019

Application Security Testing Best Practices – Part II

In our last post, we talked about some basic best practices that must be followed while performing security testing activities..

Read More
10 Jun, 2019

Application Security Testing Best Practices – Part I

With cyber attacks increasing exponentially, security testing has become a necessity for organizations across the globe. Even if an organization has developed an application..

Read More
07 Jun, 2019

HIPAA and Penetration Testing – Part II

In the first part of this article, we discussed the basics of HIPAA along with the Privacy Rule and the..

Read More
03 Jun, 2019

HIPAA and Penetration Testing – Part I

HIPAA stands for the Health Information Portability and Accountability Act of 1996, and it was enacted by the US Congress and..

Read More
03 Jun, 2019

Vulnerability Assessment and Penetration Testing

Scenario 1: An organization develops an application and immediately deploys it without any testing. Same is true for the rest..

Read More
1 2 3 4 5