Security Testing and Assessments
10 tips to examine while implementing Zero Trust Model
Shifting to a Zero Trust Network Access Model from a traditional Virtual Private Network (VPN) model can be a significant undertaking for an organisation. It entails fundamental shift in security architecture from trusting everyone entering the perimeter network to trusting nobody. In the fast-growing IT landscape and ever-increasing cyber threats, to…
What is Red Team Assessment?
We can conduct vulnerability assessments and penetration tests, but does it mean you are 100% secure from advanced threat? Does it say your defenses are growing & increasing in complexity that can match advancing attacks? For examples banks can be vulnerable to mobile malware, Oil & Gas industries can be…