POOJA GAONKAR

Android Application Penetration Testing Part – 4

As per my last article(Part 1), ( Part 2), (part-3) we had a look at basic architecture and penetration testing tools and…

1 year ago

Android Application Penetration Testing Part 3

In my last article( Android Application Penetration Testing Part 1 ), ( Android Application Penetration Testing Part 2 )we had…

1 year ago

Web Application Attacks – Types, Impact & Mitigation – Part-2

With this article, we list some of the common Web Application Attacks part-2, impacts, and possible mitigation. In part -2…

1 year ago

Android Application Penetration Testing – Part 7

In the Last Part, Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP…

1 year ago

Android Application Penetration Testing Part 2

In my last article(Android Application Penetration Testing Part 1) we had look at the basic architecture of the Android device.…

1 year ago

Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide

Cyber Security operations center is protecting organizations and the sensitive business data of customers. It ensures active monitoring of valuable…

1 year ago

Android Application Penetration Testing – Part 1

Android security testing is more often used by security industries to test the vulnerabilities in Android applications. After web applications,…

1 year ago

Why is DevOps Crucial for Modern Businesses?

With changing times and various new business adaptations, DevOps have become an integral part of the growth and efficiency of…

2 years ago

Data Security With Cloud Compliance: Meeting Regulations & Standards

Businesses from all industries are aware of the benefits of cloud computing. Some organizations are just getting started with migration…

2 years ago

Migrating Data Safely: A Cyber Security Checklist for Enterprises

In many ways, you can compare data migration to moving to a new house. While the prospect of starting anew…

2 years ago