en flag +1 214 306 68 37

Information Security Blog

Welcome to our Information Security blog!

This blog is for CIOs, managers, and security professionals who are looking to enhance their cybersecurity posture. Stay updated on emerging kinds of cybersecurity threats, cyber protection methods, and various security testing types by reading short and informative articles from our ethical hackers and security consultants.

All the articles are based on our hands-on experience in providing security and compliance services to businesses in 30+ industries, including healthcare, BFSI, retail, manufacturing, and telecoms. Bookmark to stay on top of the latest cybersecurity trends!

Dmitry Kurskov

Cybersecurity Director and Principal Architect, ScienceSoft

Defenders on Demand: Best Practices for Cybersecurity Outsourcing

Information Security

Defenders on Demand: Best Practices for Cybersecurity Outsourcing

Find out why even large-scale businesses go for cybersecurity outsourcing and learn best practices for working with third-party security vendors.

Dmitry Kurskov

Cybersecurity Director and Principal Architect, ScienceSoft

Business Email Compromise and Ways to Prevent It

Information Security

Business Email Compromise and Ways to Prevent It

Find out what harm business email compromise can inflict and how you can prevent it. By ScienceSoft, in cybersecurity since 2003.

Sergey Golubenko

Principal Architect, Productivity Solutions Expert, ScienceSoft

How to Protect Internal Websites from Security Threats

SharePoint

Information Security

How to Protect Internal Websites from Security Threats

Learn about the most common internal and external security threats to intranets. Explore best practices of protecting internal websites.

Ulad Murashka

Cybersecurity Expert, CEH

Gray Box Penetration Testing: Essence, Value, Execution

Information Security

Gray Box Penetration Testing: Essence, Value, Execution

Learn what you need to know about gray box penetration testing, including its benefits and how to conduct it in your organization.

Ulad Murashka

Cybersecurity Expert, CEH

White Box Penetration Testing: Essence, Value, Techniques

Information Security

White Box Penetration Testing: Essence, Value, Techniques

Everything you need to know about white box penetration testing, including techniques, benefits, and process steps.

Ulad Murashka

Cybersecurity Expert, CEH

Application Security Testing (AST): Essence, Value, Types and Tools

Information Security

Application Security Testing (AST): Essence, Value, Types and Tools

Find out what the benefits of application security testing are, what AST software is available, and when and how to utilize each tool type.

Ulad Murashka

Cybersecurity Expert, CEH

Compliance Testing: Essence, Value, Steps

Information Security

Compliance Testing: Essence, Value, Steps

Learn everything you need to know about software compliance testing and how you can perform compliance testing in your company.

Ulad Murashka

Cybersecurity Expert, CEH

Vulnerability Testing as a Part of Information Security Management

Information Security

Vulnerability Testing as a Part of Information Security Management

Learn about vulnerability testing and how performing vulnerability assessments regularly can improve your IT security posture.

Ulad Murashka

Cybersecurity Expert, CEH

A Quick Guide to Penetration Testing

Information Security

A Quick Guide to Penetration Testing

ScienceSoft issues a quick overview of penetration testing: its types, cost, and how it strengthens your organization's cybersecurity.