Posts

Showing posts from August, 2017

Application Security in Cloud

Cloud is the no more a new buzz, and slowly the world is moving towards cloud to save cost and transfer ownership of their own infra challenges to cloud vendors. There are many considerations for cloud and which model to follow completely depends on requirements and vision of an organizations moving to cloud. While cost plays a major role, still security challenges will still be in place when cloud is considered for the applications. There may be a case when applications are still developed in house and hosting happens on cloud as production. It is very important to simulate cloud security considerations when development of applications is in process. In many cases, development environment may not be more secure compared to production as it is required for testing, however this could also pose challenge as to make application fast and scalable, some security points may be left. In order to ensure cloud applications are secure enough for business purpose, few points are me

Effective Vulnerability Management

Vulnerability Management forms the core of cyber security be it infra or applications. Infrastructure layer vulnerability creates more challenges as it is connected to more internal networks and forms a backbone of organization business sustenance. While all organizations do vulnerability management, some internal with their own team, some through third party vendors, but still during attacks or security breaches, it is found more and more systems are prone to cyber attacks.  There are multiple solutions in the market from OEM to open source who claims to provide the hawk eye view of business security challenges, however still business owners finds it difficult to perform effective vulnerability management. We are listing here possible measures to ensure vulnerability management program is effective Discovery of Assets : - This forms the first steps and core of this program. If the assets are not tagged or discovered, then entire exercise goes in wrong direction. Any

How to start web application security assessment

Web application security forms the backbone of many business as it represents the web form of business review and conduct day to day business. In today's scenario, many web forms and business sites, perform major transactions on websites and moving to mobile applications. While security standards should be followed during coding phases, still there are major challenges when the application goes live. The reason for vulnerable application can vary depending on business needs as business wants the production to go at a rapid pace and still working on budgets to propose the security requirements, old/legacy codes with reusable components are used to rush the code to production. We will list down certain points which can be helpful to understand while starting web application security assessment. 1.  Understand the business applications         Before starting any assessment, it is very important to understand the business needs of the                 application. 

Web Application Security Testing

Image
Web Application are the front face of business and shows the business value. While we write the blog, we present the below video from our channel for every one to make it easy to understand and what steps should be taken to complete the web application security testing.  Keep visiting more for more on application security

Network Penetration Testing Broad View

Network Penetration Testing shows the exposure of network to vulnerabilities and how easily that can be exploited. It is important for network admin to sensitize themselves towards network penetration testing methodology and how it can be achieved. See the video below...