The General Data Protection Regulation (GDPR) is a cyber security framework introduced by the European Union (EU) on May 25th, 2018. It is the most stringent […]
The healthcare industry is becoming increasingly reliant on technology, with electronic medical records, online appointment scheduling, and telemedicine becoming common practices. However, as technology becomes more […]
Achieving compliance with the Service Organization Control (SOC) 2 Type II framework is essential for any organization that handles sensitive data. One key component of SOC […]
A data lake is a simple, scalable, and cost-efficient storage option that allows companies to securely store a considerable amount of their sensitive data. Although, with […]
Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. […]
Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
Let’s start first with what is a data lake? Below is the oversimplified definition – Data Lake acts as a single centralized repository where raw data […]