Blog Archives - StrongBox IT

Blog

Phishing is a form of social engineering where an attacker masquerades as a reliable entity or asset and tries to breach the system by misleading them. […]

An injection is a broad class of attack vectors where the attacker provides an altered input to a program. When the input gets executed as a […]

OWASP Top 10 Vulnerabilities

OWASP The Open Web Application Security Project (OWASP) is an online nonprofit initiative that derives a set of rules or protocols, articles, methodologies in the field […]

Cybersecurity Trends 2021

With the unending pandemic, all businesses, small or large corporates, organizations, and even governments rely on computerized systems to manage daily activities and make cybersecurity the […]

Cybersecurity in healthcare

In the current scenario, healthcare leaders are extra equipped to increase spending on cybersecurity. But with new threats uncovered every day, it is exhausting to recognize […]

WooCommerce has made ecommerce website building and developing easy with multiple plugins automating the tasks without any coding knowledge. TI WooCommerce Wishlist is one such plugin […]

Install Modshield from AWS

Step 1:Open the GCP Marketplace listing page that suits your licensing model (Cloud / BYOL), and click on the Launch button.   Step 2: Provide a […]

Security Testing

According to an article in CIO magazine, a typical USD500+ million organization has 3,000+ applications. While average, organizations (excluding financial firms) have around 600 business-critical applications. […]

Firewalls

With the accelerated rise in the number of companies adopting cloud for running business applications and saving private data, cyber criminals have started to target web […]