Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • Infrastructure Security Testing
    • IoT Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Secure Development – Web
    • Secure Development – Mobile
  • Resource
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Category Archives: Blog

  • Home
  • Category
December 7 2021
  • Blog

Information Security

What is Information Security? Information security, abbreviated as InfoSec, is the process of safeguarding information by mitigating information risks. It’s […]

Read More
November 18 2021
  • Blog

What is ISO 21434?

What is ISO 21434? Over many years, the vehicle and system development process have been refined to standardize specification and […]

Read More
November 8 2021
  • Blog

Enterprise-Grade Firewall – Why do you need it for your business?

WHAT IS A WAF? Web Application Firewall filters web traffic between the internet and web application. WAF is based on […]

Read More
November 1 2021
  • Blog

WHAT IS HIPAA?

The Health Insurance Portability Accountability Act was established as federal law by the government of the United States to set […]

Read More
October 29 2021
  • Blog

Modsecurity WAF

What is ModSecurity? ModSecurity is an open-source, cross-platform WAF(Web Application Firewall) designed primarily for Apache HTTP servers. It provides an […]

Read More
October 25 2021
  • Blog

Free WAF(Web Application Firewall) vs Enterprise WAF(Web Application Firewall)

What is WAF? Web Application Firewall is for filtering web traffic between the internet and web application. WAF is based […]

Read More
October 21 2021
  • Blog

Different types of hackers that one should be aware of

Every business has a set of assets or sensitive data that malefactors may seem to exploit regardless of its size. […]

Read More
October 12 2021
  • Blog

Cyber Security Best Practices

Enhancing cyber security from the break room to board room National Cyber Security Alliance and the U.S. Department of Homeland […]

Read More
October 11 2021
  • Blog

WAF vs Network Firewall

What is a WAF? Web Application Firewall (WAF) helps guard web applications by monitoring and filtering HTTP traffic between web […]

Read More
October 11 2021
  • Blog

OWASP top 10 vulnerabilities 2021

OWASP? The Open Web Application Security Project (OWASP) is an open-source initiative that derives a set of rules or protocols, […]

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Recent Posts

  • Top Cyber News April Week 3
  • Top Cyber News April Week 2
  • Data security in cloud computing
  • Cybersecurity For Fintech – Finance Industry
  • Top Cyber News April Week 1

Recent Comments

  1. Vishnu on IEC 62443 – Cybersecurity for Industrial Automation and Control Systems

Archives

  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
  • WAF
© Copyright 2020. Anada WordPres Theme By WordPressRiver
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}