All Posts (2226)

Sort by

5 Key Benefits of Source Code Analysis

6xxliq.jpgStatic Code Analysis: Binary vs. Source

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. According to Gartner’s 2011 Magic Quadrant for Static Application Secu

Read more…
Views: 168
Comments: 0

10 Steps to Secure Agile Development

288qb79.jpgIn Agile’s fast-paced environment and frequent releases,security reviews and testing sound like an impediment to success. How can you keep up with Agile demands of continuous integration and continuous deployment without abandoning security best prac

Read more…
Views: 244
Comments: 0

Your Guide to Multi-Layered Web Security

Why Read This Report

The data center perimeter is dead. But its memory lives on in the way many IT departments continue to secure their infrastructure. The meteoric rise of the Internet brought with it an ever-changing landscape of new attacks and co

Read more…
Views: 146
Comments: 1

Safeguarding Critical Data & Strong Backup

To protect sensitive/critical data available on users’ laptops we implemented a remote backup solution that can back up the important files and folders on the users’ laptop to a remote server. The main purpose was to safeguard the sensitive/critical

Read more…
Views: 129
Comments: 0

7 Tips For DLP Implementation

Kotak Mahindra Bank has initiated the DLP implementation across all business units in a phased manner and the implementation was started 6 months ago with critical business units. The solution monitors all channels, viz. Internet, Email and End point

Read more…

Incident Response Policies and Procedures

If not all, we can point out the various major policies that can help you kick-off. For easy reading we've cut the details, here's the checklist:

AUP - Acceptable Use Policy or Fair Use Policy defines the ways/restrictions of using the Organisation's

Read more…
Views: 25
Comments: 0

Most Important Tools for Incidence Response

Based on OS

Windows tools:

Specific Tools:

  1. Log Parser - 
  2. EnCase -
  3. ILook(LEO Only) -
  4. Paraben -
  5. ProDiscover -
  6. TCPView -
  7. AccessData -
  8. COFEE(LEO Only) -
  9. WinHex
  10. X-Way Forensics/WinHex Pro
  11. FileControl-DD etc.
  12. Wireshark-Ethereal(packet sniffer)
  13. Dsniff-Dug
Read more…
Views: 12
Comments: 0

What are the stages of Incident Response

Stages of Incident Response-

1. method 1

2. method 2

Method1(7-steps)

  1. Preparation
  2. Identification
    categories based on incident type
  3. Containment
  4. Investigation
  5. Iradication
  6. Recovery
  7. Follow up

Method2(4-steps)

  1. Preparation
  2. Detection and Analysis
  3. Conta
Read more…
Views: 38
Comments: 0