This user doesn't have a profile picture yet.
Registered since July 2nd, 2020
Has a total of 17 bookmarks.
Showing top Tags within 17 bookmarks
cybersecurity nesa nesacompliance informationsecurity pcidss bcp pentesting business pciaudit UAE ccpacertification nesaaudit ecommerce IAS Standards vapt BankingIndustry linux vistainfosec hipaacompliance SOC1 compliance pcidsscompliance pcicompliance Security controls soc2 Banking ccpa businesscontinuity businessrisk healthcareindustry SOC1reporting penetrationtesting scp security soc2audit Cooperativebank ccpacompliance bcpplan datasecurity vulnerabilityassessment RBI penetration testing databreach businesscontinuityplan hipaa owasp
Saved by Travisliska on September 15th, 2020.
We start with another boot2root machine from Vulnhub. This machine is called Infovore and is misconfigured by the administrators a very known vulnerability that appears in OWASP Top 10. As per the description of the machine, it is supposedly configured by lazy administrators and our job is to exploit innocent-looking PHP functions while capturing all 4 flags on the machine. We start with powering on the virtual machine.
Saved by Travisliska on September 10th, 2020.
For your better understanding of a Bridge Letter, we have today briefly discussed the relevance and significance of a bridge letter in a SOC1 and SOC2 Report. This post will cover most of the common questions users have about the bridge letter related to SOC reports (both SOC 1 and SOC 2).
Saved by Travisliska on September 2nd, 2020.
In this post, we intend to clear the common misconception and highlight the differences between Vulnerability Assessment and Penetration Testing. The article details when and where each of the security assessment processes is used and applicable to organizations.
Saved by Travisliska on August 21st, 2020.
The California Consumer Privacy Act (CCPA) is a privacy law that regulates how businesses all over the world are allowed to handle the personal information (PI) of California residents
Saved by Travisliska on August 4th, 2020.
E-commerce businesses have exponentially flourished over the past decade. With the boom in the industry, so has the level of risk in context to data breach/ theft spiked over the years. It is therefore imperative for e-commerce businesses to ensure safety and protect consumer data.
Saved by Travisliska on July 27th, 2020.
Business Continuity Plan is all about having in place strategies and a test plan that can help cope with the situation with the least or minimum impact.
No further bookmarks found.