• 23 May 2018

    Understanding The Financial Impact of Application Security

    Widespread Adoption of mainstream IOT in recent years, made it complicated to lock down IT systems and opened up several new avenues of typically dangerous penetration. While businesses are getting increasingly reliant on technology and internet presence, the time has been critical to reevaluate if economic strategy and budget has been sufficient to prevent and

  • 12 Dec 2017

    Top 10 Intrusion Risk Your Web Application Might Be Exposed to

    Application layer is the most vulnerable layer of any application and is the hardest to defend since it has to remain exposed through the publicly accessible avenues. Any consumer facing web application has to made itself over either port 80 (for http requests)  or  port 443 (for https requests) or the both in order to

  • 12 Dec 2017

    6 Most Popular SQL Injection Techniques Web Developers Must Be Cautious About

    SQL Injection is the most commonly used technique of intrusion to an web application where malicious SQL statements are inserted into the database server of an web/cloud application to execute certain operations such as extracting data from the database, deleting the entire database or making it inaccessible for the application. Over time a number of