Webinar-Under The Hood Of Deception Technologies

Webinar-Under The Hood Of Deception Technologies

What will you learn: How is deception technology different from honeypots ? Deception v/s EDR, UEBA and NTA A hacker’s view of deception across the kill-chain Key technology capabilities or key components of deception technology   About Speaker: Sahir Hidayatullah Cofounder, Smokescreen @sahirh     Sahir started his security career as an ethical hacker andRead more about Webinar-Under The Hood Of Deception Technologies[…]

Cyber Security Maturity Report of Indian Industry (2017)

Cyber Security Maturity Report of Indian Industry (2017)

  In Cyber Security Maturity Report of Indian Industry (2017), we’ve researched the current cybersecurity maturity of Indian industry based on the kind of technical security controls they have in place against modern day attacks. Cyber security is now a persistent business risk, across organizations of all size, large or small. To  secure businesses, youRead more about Cyber Security Maturity Report of Indian Industry (2017)[…]

Secure SDLC Program: “The Art of Starting Small”

Secure SDLC Program: “The Art of Starting Small”

I have seen several organizations trying to adopt secure SDLC and failing badly towards the beginning. One of the biggest reason is they try to use “Big Bang Approach”. Yeah, there are several consultants who will push you to go for a big project use the classical waterfall model to adopt secure SDLC. But that’s askingRead more about Secure SDLC Program: “The Art of Starting Small”[…]

Checklist: How to choose between different types of Application Security Testing Technologies?

Checklist: How to choose between different types of Application Security Testing Technologies?

This blog will provide the pros and cons of different types of Application Security Testing Technologies, and checklist to chose among them. Static Application Security Testing (SAST) SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.   ProsRead more about Checklist: How to choose between different types of Application Security Testing Technologies?[…]

CISO Viewpoint: Safe Penetration Testing

CISO Viewpoint: Safe Penetration Testing

Safe Penetration Testing – 3 Myths and the Facts behind them Penetration testing vendors will often make promises and assurances that they can test your Web Applications safely and comprehensively in your production environment. So when performing Penetration Testing of a Web Application that is hosted in a Production Environment you need to consider the following myths and factsRead more about CISO Viewpoint: Safe Penetration Testing[…]

SAST vs. DAST: How should you choose ?

SAST vs. DAST: How should you choose ?

This blog will provide information about SAST or Static Application Security Testing and DAST or Dynamic Application Security Testing. And also answer the common question of SAST vs DAST. What is SAST? SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need aRead more about SAST vs. DAST: How should you choose ?[…]

How to choose your Security / Penetration Testing Vendor?

How to choose your Security / Penetration Testing Vendor?

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization.Read more about How to choose your Security / Penetration Testing Vendor?[…]

Top 5 Application Security Technology Trends

Top 5 Application Security Technology Trends

Following are the top 5 Application Security Technology Trends: 1.    Run Time Application Security Protection (RASP) Today applications mostly rely on external protection like IPS (Intrusion Prevention Systems), WAF (Web Application Firewall)etc and there is a great scope for a lot of these security features being built into the application so that it can protect itselfRead more about Top 5 Application Security Technology Trends[…]