Risk Based Compliance Management
Risk Based Compliance Management Compliance means conforming to a rule, such as a specification, policy, standard or law. Some compliances are generic […]
Unlocking Software Transparency: SBOM Implementation with Real-World Case Studies
🔍 Introduction to SBOM Implementation Modern software systems are built on complex layers of third-party, open-source, and proprietary components. Without visibility into […]
Crying Wolf: A case for risk assessment in vulnerability management
“There was once a shepherd boy who kept crying ‘Wolf! Wolf!’ just to see people panic… until one day, the wolf really […]
Risk Based Vulnerability Management (RBVM)
Risk Based Vulnerability Management (or RBVM) is a process by which one evaluates the business risk for an organization resulting from its […]
Seconize Achieves Triple Gartner Recognition: The Only Indian Vendor Featured Across Vulnerability Management, TPRM, and Cyber GRC
## Three Gartner Reports, One Unified Vision 1. Market Guide for Vulnerability Assessment (2024) Gartner recognized Seconize for our innovative approach to […]
File Integrity checker
Recently I discussed my experience regarding web application testing, how to ease report writing, mitigation of common low impact vulnerabilities etc. This article […]
Open Audit(GPL version) SQL injection vulnerability
My First Exploitation – Open Audit(GPL version) SQL injection vulnerabilityTo learn swimming,you have to get in to water. Searching Searching…Searching! for the […]
Continuous Vulnerability Assessment and Remediation
Everyone who is in cyber security or relates to cyber world will look for better ways of security assurance. But there is no […]
Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Adversary : Now a days as the technology is upgrading to serve mankind, it has many inherent flaws as well. Also it […]
Controlled Use of Administrative Privileges – keeping attackers in check
The moment an organization uses privileged user accounts on any device or service, their device or networks are at risk to potentially get […]
Ransomware – New and Growing Trend of Cyber Money Extortion
A new trend has emerged called ‘Ransomware’ where attackers are targeting enterprises to extort money by disabling large parts of their operations […]
System Audit logs
The 6th most important security check from SANS top 20 security checks is ‘System audit logs’. System Audit logs are the main key which keeps […]