Blogs

Uncategorized

Supply Chain Attacks

A supply chain is a network between an organization and its suppliers to produce and distribute a specific product to the final customer. A…
Uncategorized

Threat Landscape

  During the last few years, we are continuously stepping towards the digital platform, and the usage of digital devices has increased rapidly. More…
Uncategorized

OWASP IoT Top 10

    Alexa!! Can you please play a song for me!! We are surrounded by technologies that are growing at a fast pace, and…
Uncategorized

Cloud Security

  Cloud Computing is increasingly becoming popular due to large sets of the data output of various programs run by multiple enterprise applications. Cloud…
Uncategorized

Cyber Forensic

“Absence of evidence is not evidence of absence.” Computers, mobile phones, PDA’s, and other digital devices play an integral part of our lives to…
Menu