Information Security Blog
Welcome to our Information Security blog!
This blog is for CIOs, managers, and security professionals who are looking to enhance their cybersecurity posture. Stay updated on emerging kinds of cybersecurity threats, cyber protection methods, and various security testing types by reading short and informative articles from our ethical hackers and security consultants.
All the articles are based on our hands-on experience in providing security and compliance services to businesses in 30+ industries, including healthcare, BFSI, retail, manufacturing, and telecoms. Bookmark to stay on top of the latest cybersecurity trends!
Serguei Tchesnokov
Information Security
Indicators of Compromise: Their Role in a Company’s Information Security
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Source Code Review vs. Penetration Testing for Web Application Security
Ulad Murashka
Cybersecurity Expert, CEH
Information Security
Different Types of Penetration Testing and Why You Need Them
Serguei Tchesnokov
Information Security
Traffic Pattern Analysis Inside Out
Dmitry Nikolaenya
Cybersecurity Expert
Information Security
Magic Out-of-the-Box – Does It Apply to SIEM Solutions?
Dmitry Nikolaenya
Cybersecurity Expert
Information Security
No Wanna – No Cry or the Ways to Prevent Ransomware Attacks
Serguei Tchesnokov
Information Security
Detecting APT Activity with Network Traffic Analysis
Dmitry Nikolaenya
Cybersecurity Expert
Information Security
What Can Go Wrong with SIEM Correlation Rules?
Dmitry Nikolaenya
Cybersecurity Expert
Information Security
Information Security Breaches? - Security Event Sources to Blame
Dmitry Nikolaenya
Cybersecurity Expert
Information Security
How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It
Serguei Tchesnokov
Information Security
Chasing Spyware with a SIEM Solution to Pull the Plug on an APT
Serge Pukhaev
Project Manager, IoT Expert, ScienceSoft
Internet of Things
Information Security
Fleet Management
Transportation & Logistics IT