Data Security

January 17, 2023

GDPR Compliance Checklist

The General Data Protection Regulation (GDPR) is a cyber security framework introduced by the European Union (EU) on May 25th, 2018. It is the most stringent […]
January 10, 2023

The Impact of Cybersecurity Breaches on Public Trust in Healthcare

The healthcare industry is becoming increasingly reliant on technology, with electronic medical records, online appointment scheduling, and telemedicine becoming common practices. However, as technology becomes more […]
December 28, 2022

Implementing a Backup Strategy for SOC 2 Type II Compliance: A Step-by-Step Guide

Achieving compliance with the Service Organization Control (SOC) 2 Type II framework is essential for any organization that handles sensitive data. One key component of SOC […]
November 21, 2022

Breaking Down Data Lake Security

A data lake is a simple, scalable, and cost-efficient storage option that allows companies to securely store a considerable amount of their sensitive data. Although, with […]
November 15, 2021

Recon: an important part of penetration test for finding vulnerabilities

Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. […]
October 13, 2021

Double-check Inputs to Avoid SSRF Vulnerability

Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
September 27, 2021

Serialization and Deserialization: Languages they work with

When an object is translated to a byte sequence, and the byte sequence can be kept on a disk or sent through streams, the process is […]
July 29, 2021

What is Data Lake? Understanding Data Lake Building Security

Let’s start first with what is a data lake?  Below is the oversimplified definition – Data Lake acts as a single centralized repository where raw data […]
Enable Notifications OK No thanks