sandeep karnikMar 1, 20235 minBusiness Continuity PlanningInformation Security (InfoSec) is a vast field. Among other areas, one, often neglected but equally important as others, is "Business...
sandeep karnikFeb 23, 20235 minBroken Access Control - On top of the OWASP-Top 10 ListIntroduction The "OWASP Top 10" lists the top ten most critical web application security risks, and "Broken Access Control" currently...
sandeep karnikFeb 22, 20236 minHow is Red Teaming different than Conventional Pen Testing?Introduction The main difference is Red Teaming simulates real-life attacks. While doing so, the objective is to remain as evasive and...
sandeep karnikFeb 22, 20235 minAWS EC2 - Purchase options - a comparisonAmazon Web Services (AWS) Elastic Compute Cloud (EC2) is a popular cloud computing service that allows users to rent virtual computing...