Data Security

November 15, 2021

Recon: an important part of penetration test for finding vulnerabilities

Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. […]
October 13, 2021

Double-check Inputs to Avoid SSRF Vulnerability

Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
September 27, 2021
Serialization and Deserialization

Serialization and Deserialization: Languages they work with

When an object is translated to a byte sequence, and the byte sequence can be kept on a disk or sent through streams, the process is […]
July 29, 2021

What is Data Lake? Understanding Data Lake Building Security

Let’s start first with what is a data lake?  Below is the oversimplified definition – Data Lake acts as a single centralized repository where raw data […]
Enable Notifications    OK No thanks