Benefits of Phishing Simulations

Email is the primary channel for corporate communications. On the one hand, emails have seamlessly replaced printed papers and postal delivery system that took multiple days to deliver letters across the country, while on the other hand, the attackers utilize email as a propagation medium to launch various types of attack. In this article, we explore the … Continued

Cloud-based application security testing –Challenges

In the last article, we discussed objectives and key facts cloud-based application security testing. Apart from the general information security challenges that the cloud services face on a daily basis, we will be discussing various challenges which act as major obstacles in the mass adoption of cloud-based security testing.  Figure 1: Challenges Challenge 1: Distributed Computing Risks  Cloud is often interpreted … Continued