• Sandeep Mishra

    Anti-Frame Busting - Dismissing Protection Scripts

    In this blog, you will learn about Anti-Frame busting – dismissing protection scripts.
    Sandeep Mishra Dec 05, 2020
  • Himanshu Upreti

    Identity Provider for API Security Mechanism

    This blog gives an overview of achieving authentication and authorization using identity providers for quick and easy integration. It focuses development rather than security, as it is done by a th...
    Himanshu Upreti May 08, 2020
  • Deepak Garg

    Cookie - HttpOnly Attribute Is Not Set

    In this blog, we will discuss how a cookie becomes vulnerable when the HttpOnly attribute is not set especially when it contains sensitive information like SessionId.
    Deepak Garg Apr 09, 2019
  • Ajit Khodke

    Evolving Safely In The Heart Of The Digital World

    Over the last several months, the media has repeatedly reported on the exploitations of cybercriminals using their malware to shut down equipment and networks or take data hostage with a ransom dem...
    Ajit Khodke Apr 02, 2018
  • Harsh Patel

    Google May Show Alert On Your Website After March 15, 2018

    Digicert finishes acquisition of Symantec's SSL and related PKI solution business. Now the browser community distrusts Symantec SSL certificates and after 15th March 2018, your website with Sym...
    Harsh Patel Mar 22, 2018
  • Naveen Sharma

    The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
    Naveen Sharma Apr 19, 2017
  • Jaymin Dangi

    Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
    Jaymin Dangi Feb 14, 2017
  • Serguei Tchesnokov

    Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
    Serguei Tchesnokov Oct 13, 2016
  • Bhuvanesh Mohankumar

    Check your Firewall Port Details

    In this blog you will learn how to Check your Firewall Port Details.
  • Supreet Tare

    Knowledge Sharing Eves: Authentication Types & Authentication Systems

    This week it was Kunal who helped us understanding more on Authentication in general. Read more for details.
    Supreet Tare May 04, 2013
  • Mahesh Chand

    Web Data Security Most Popular Job by 2015?

    If the speed of data keep at the same pace as today, IDC predicts, the amount of data on the Web will be 50 times than today. In year, 2011, the amount of data created and replicated is close to 2....
    Mahesh Chand Jul 03, 2011
  • Raghavendra U

    Encryption and Decryption in .net

    Encryption and Decryption in .net
    Raghavendra U Jan 30, 2010
  • Mahesh Chand

    Microsoft's OneCare - Threat to Norton and McAfee?

    Microsoft OneCare provides all-in-one including AntiVirus, Firewall, Antospyware, Anti-phishing, backup and restore and more.
    Mahesh Chand Sep 18, 2007