Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • IoT Security Testing
    • Infrastructure Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Cybersecurity For Developers(Web Application)
    • Cybersecurity For Developers(Mobile Application)
  • Resources
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Category Archives: Blog

  • Home
  • Category
SOC 2 Compliance
July 4 2022
  • Blog

SOC 2 Compliance – Complete Guide

What is SOC 2 compliance?  SOC 2 is a standard for managing client data that was created by the American […]

Read More
Compliance blog cover
June 8 2022
  • Blog

What is compliance and why do you need it?

What is Compliance? “The act of complying with a directive,” or “the state of meeting regulations or norms,” is how […]

Read More
OWASP WAF Cover
June 8 2022
  • Blog

OWASP WAF – Web Application Firewall

Who is the OWASP Foundation and what do they do? The Open Web Application Security Project (OWASP) is a non-profit […]

Read More
April 12 2022
  • Blog

Data security in cloud computing

What is data security in cloud computing? Data security in cloud computing refers to the set of technical solutions, policies, […]

Read More
April 11 2022
  • Blog

Cybersecurity For Fintech – Finance Industry

Fintech Cybersecurity Risks If you own a Fintech company, cybersecurity risks should be your number one priority. To mitigate risks, […]

Read More
April 7 2022
  • Blog

6 Must-Have Features To Look For In A WAF

WAF Must-Have Features Web Application Firewall (WAF) adds a layer of defence between the site’s traffic and the web application, […]

Read More
March 7 2022
  • Blog

OWASP Mobile Top 10

What are OWASP Mobile Top 10? M1-M10 are the mobile Top 10 list items, which are comparable to their online […]

Read More
March 1 2022
  • Blog

What is White Box Testing?

White Box Penetration Testing White box testing tests the resilience of the internal, and external systems of an application by […]

Read More
February 11 2022
  • Blog

Basics of Cybersecurity

The Definition Of Cybersecurity Before going into the definition of Cybersecurity let’s cover some basics. Online communications take place in […]

Read More
February 8 2022
  • Blog

What is Cloud Penetration Testing?

Cloud Penetration Testing Cloud Penetration Testing is an authorized simulation of a cyberattack against a system that is hosted on […]

Read More
  • 1
  • 2
  • 3
  • …
  • 6

Recent Posts

  • SOC 2 Compliance – Complete Guide
  • What is compliance and why do you need it?
  • OWASP WAF – Web Application Firewall
  • Top Cyber News April Week 3
  • Top Cyber News April Week 2

Recent Comments

  1. Vishnu on IEC 62443 – Cybersecurity for Industrial Automation and Control Systems

Archives

  • July 2022
  • June 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
© Copyright 2020. Anada WordPres Theme By WordPressRiver