Security Testing and Assessments

10 tips to examine while implementing Zero Trust Model

10 tips to examine while implementing Zero Trust Model

Shifting to a Zero Trust Network Access Model from a traditional Virtual Private Network (VPN) model can be a significant undertaking for an organisation. It entails fundamental shift in security architecture from trusting everyone entering the perimeter network to trusting nobody. In the fast-growing IT landscape and ever-increasing cyber threats, to…
What is Red Team Assessment?

What is Red Team Assessment?

We can conduct vulnerability assessments and penetration tests, but does it mean you are 100% secure from advanced threat? Does it say your defenses are growing & increasing in complexity that can match advancing attacks? For examples banks can be vulnerable to mobile malware, Oil & Gas industries can be…