-
Mobile App Security – Emerging Threat Landscape
By Manoj Rai On 8 Jul 2015Mobile apps have been increasingly gaining ground in the communication industry. Enterprises are rapidly adopting innovative mobile applications to transform their business capabilities as the mobile presence is critical for businesses to attract, retain and communicate with customers; it has...
-
Disruptive Technology Weekly Roundup – Jun 29th to Jul 5th
By Kiran Veigas On 6 Jul 2015Technology has been a game-changer since time immemorial. But with that comes disruption. As newer technology innovations kick in and mould the way we do things and open up newer possibilities, the conventional business models become redundant and overthrown. The...
-
Static Code Analysis for Enterprise Applications
By Manoj Rai On 6 Jul 2015The increase in adoption of Social, Mobile, Analytics, and Cloud (SMAC) technologies and growth in data volumes has led to increased concerns about data security. With large enterprises building or deploying new applications using public cloud platforms, there are doubts...
-
Why it is critical to pen test your ERP system
By Manoj Rai On 6 Jul 2015An ERP system is really at the heart of any organization. It enables and facilitates all critical business processes human resources management, financial planning, product management, and more. More importantly, it holds all the data critical to the organization financial...
-
The Critical Need for an Architecture and Design Review
By Manoj Rai On 6 Jul 2015The security of an application, network or operating system, and their associated functionalities relies primarily on their architecture and design. Which is why an Architecture and Design review is critical in helping you analyze and validate your organization's overall security....
Tag Cloud
Subscribe for blog updates