Uncategorized

Information Technology General Controls (ITGC)

Information Technology General Controls, popularly called ITGCs refers to the set of control such as policies,procedures, and technologies that an organization puts in place to ensure confidentiality, integrity, andavailability of its information and IT systems.ITGC review is an assessment of these controls to determine their effectiveness in protecting the organization’sinformation and IT systems. A comprehensive […]
Read More

Automotive Cybersecurity. An Introduction

Introduction to Automotive Cybersecurity Cybersecurity is the practice of protecting digital assets from malicious attacks. It is also referred to as “information technology security” or “electronic information security.” The term is used in a variety of contexts, but in this article, we will be considering cybersecurity in the context of automobiles.  The automobile industry has […]
Read More

Service Organization Control: An Introduction

Service Organization Control 1 (SOC 1) and Control 2 (SOC 2) are two standards for assessing a service organization’s internal controls. The American Institute of Certified Public Accountants (AICPA) established these standards to assist service organizations in demonstrating their dedication to security, availability, confidentiality, and privacy. SOC 1 is especially concerned with the financial reporting […]
Read More

Cloud Computing Services

In our last article, we talked about the different cloud deployment models: Public, Private, Hybrid, andCommunity. In this article, we will be discussing the cloud computing services which are mainly three types IaaS(Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service). Cloud computing is the distribution of IT resources on-demand through the Internet with pay-as-you-gopricing. Instead of purchasing, […]
Read More

Cloud deployment models

The deployment model is an important aspect of cloud computing. A cloud deployment model is a specificconfiguration of the environment’s variables, including storage capacity, ownership of the deploymentinfrastructure, and accessibility. This implies that deployment models employed by businesses are basedon the ownership (i.e who controls the infrastructure) as well as the location of the infrastructure. […]
Read More

Internet of Things (IoT) Security

The term IoT, or Internet of Things IoT has become one of the most important technologies of the 21stcentury, and it simply refers to the collective network of connected devices (smart devices) each with itsunique identifier automatically collecting and sharing data over a network. These devices range fromordinary household objects to sophisticated industrial tools.The fast […]
Read More

Five (5) API security testing tools you need to know.

There are several tools that have been used to access API security. Depending on each organization’s needs, a certain tool can be the ideal option for one but not the other. Although the majority of these API security testing tools have free trials or versions, enterprise users will probably need to purchase licences or explore […]
Read More

Microsoft SQL Server Security check

SQL Server, owned by Microsoft is one of the leading data platforms used as a production database to store very sensitive data. We should all know by now that data is an organization’s most valuable asset. This makes it a necessity to efficiently secure the SQL Server database.This quick post will highlight some important back-end […]
Read More
Auditing Virtualization

A Journey to Auditing Virtualization

Virtualization is the process of creating a virtual, representation of an entity, such as virtual applications, servers, storage and networks. It is the single most effective way to reduce Technology expenses by reducing hardware footprint while boosting efficiency and agility for all size businesses. However, good as it is, virtualization can create a single point […]
Read More

No products in the cart.