Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • IoT Security Testing
    • Infrastructure Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Cybersecurity For Developers(Web Application)
    • Cybersecurity For Developers(Mobile Application)
  • Resources
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Category Archives: Blog

  • Home
  • Category
DDos Attacks
May 18 2023
  • Blog

Growing DDoS Attacks to Drive Expansion of Protection Market

Introduction Distributed Denial of Service (DDoS) attacks are a growing threat to businesses and organizations worldwide. These attacks involve overwhelming […]

Read More
May 16 2023
  • Blog

Fortifying Your Digital Defences: India’s Cybersecurity Posture 2023

Cybersecurity posture In recent years, India has emerged as a global hub for technology and innovation, with a rapidly growing […]

Read More
May 15 2023
  • Blog

Cyberattacks, recovery and resilience

Introduction Being digitally active today makes one prone to a lot of cyberattacks, constant threat to individuals and organizations. While […]

Read More
CRLF Injection
May 12 2023
  • Blog

Don’t Let CRLF Injection Mess Up Your Website!

Introduction In the digital age, website security is of utmost importance. With a boost of sensitive information being exchanged online, […]

Read More
May 11 2023
  • Blog

The Necessity for Performance Testing in Today’s Digital Landscape

Introduction – Performance Testing In the fast-paced world of technology, performance testing has become an essential aspect of software development. […]

Read More
Xpath Injection Attack
May 10 2023
  • Blog

Unearthing the dangers of XPath

XPath Injection Attacks XPath is a language used to query and manipulate XML documents. It is widely used in web […]

Read More
SOC 2 Compliance
July 4 2022
  • Blog

SOC 2 Compliance – Complete Guide

What is SOC 2 compliance?  SOC 2 is a standard for managing client data that was created by the American […]

Read More
Compliance blog cover
June 8 2022
  • Blog

What is compliance and why do you need it?

What is Compliance? “The act of complying with a directive,” or “the state of meeting regulations or norms,” is how […]

Read More
OWASP WAF Cover
June 8 2022
  • Blog

OWASP WAF – Web Application Firewall

Who is the OWASP Foundation and what do they do? The Open Web Application Security Project (OWASP) is a non-profit […]

Read More
April 12 2022
  • Blog

Data security in cloud computing

What is data security in cloud computing? Data security in cloud computing refers to the set of technical solutions, policies, […]

Read More
  • 1
  • 2
  • 3
  • 4
  • …
  • 8

Recent Posts

  • Cyber-Attacks on the British Airways, Boots and BBC
  • The digital world relies on AI and biometrics for authentication
  • Moving target defence (MTD), a cybersecurity tactic can protect the critical system in the air defences.
  • Cyber Threat Intelligence (CTI): How to efficiently use a Threat Intelligence Platform (TIP)
  • Choosing a SAST solution: key considerations

Recent Comments

No comments to show.

Archives

  • June 2023
  • May 2023
  • July 2022
  • June 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
  • News
© Copyright 2020. Anada WordPres Theme By WordPressRiver