Information Security Blog
Welcome to our Information Security blog!
This blog is for CIOs, managers, and security professionals who are looking to enhance their cybersecurity posture. Stay updated on emerging kinds of cybersecurity threats, cyber protection methods, and various security testing types by reading short and informative articles from our ethical hackers and security consultants.
All the articles are based on our hands-on experience in providing security and compliance services to businesses in 30+ industries, including healthcare, BFSI, retail, manufacturing, and telecoms. Bookmark to stay on top of the latest cybersecurity trends!
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Gray Box Penetration Testing: Essence, Value, Execution
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
White Box Penetration Testing: Essence, Value, Techniques
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Application Security Testing (AST): Essence, Value, Types and Tools
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Compliance Testing: Essence, Value, Steps
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Vulnerability Testing as a Part of Information Security Management
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
A Quick Guide to Penetration Testing
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Cloud
Azure
Security Essentials in Microsoft Azure
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
How Phishing Simulation Prevents Phishing Attacks
Andy Lipnitski
IT Director and Principal Architect, ScienceSoft
Information Security
AWS
Cloud
Infrastructure Management
AWS Security Issues You Should Watch Out For
Dmitry Nikolaenya
Cybersecurity Expert
Information Security
Session Mapping to Facilitate User Identification with IBM QRadar SIEM
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Beware 6 Types of Cyberattacks To Preserve Your Company’s Reliability
Whitney Blankenship
Ecommerce
Information Security