Top 5 open-source tools for network vulnerability scanning

Organizations conduct vulnerability assessments for their networks to identify the existing vulnerabilities, weaknesses, and loopholes. The results of such an assessment can help a network administrator in understanding the security posture of their network and implement defensive measures against potential threats and vulnerabilities. So often, vulnerability assessments involve a network vulnerability scanner tool which can … Continued

ISO 27001 Certification for a SaaS Company

Every day, new SaaS products are being launched into the market, and they are being adopted, but at a relatively slower pace. At present, security continues to be the top barrier to the adoption of SaaS products. After a SaaS company implements the controls outlined in ISO 27001 and gets certified, it can show that it … Continued

Application Security SaaS – Pros and Cons 

The number of vulnerabilities that have been discovered in recent years has been increasing exponentially. Attackers are now getting more sophisticated than ever, and they are heavily focussing on the information having tangible value. Organizations have been investing in terms of security and money, and this investment is bound to increase significantly in the years to come.  … Continued

Penetration Testing for SaaS Companies

If you are running a SaaS company, your requirements change continuously due to a variety of factors. These factors include the agile development process at the core, responding to customer-specific queries, and adapting to regulations. For a SaaS company to succeed, customer trust is the biggest factor driving the sales. Unlike other types of services … Continued

Penetration Testing for the Cloud – How it is different?

If you are working in the cyber security industry, you will be familiar with terms like application penetration testing, network penetration testing, etc. However, the growth of the cloud computing industry in the last 4-5 Years has introduced a new name to the penetration testing list – cloud penetration testing.   In a traditional pen test, … Continued