Home
Products
Firesec
Services
Managed Security Services
MDR Services
SOC Design
Anti-Phishing
Managed Detection as a Service
Threat Hunting
Cybersecurity for SMEs
Ransomware Readiness Assessment Services
Data Privacy Services
IDAM Services
ICS Security
Cloud Security
Payment Security
PCI DSS QSA
PA DSS
BCMS
Assessment
Red Team Assessment
Application Security
Mobile Security Testing
SCADA and ICS
Telecom Security
Sharepoint Security
Source Code Review
Network Audit
Wireless Auditing
Security Audit
Penetration Testing
DDoS Simulation
Spear Phishing
War-Game Assessment
Security Compliances
ISO 27001
Risk Assessment
Security Awareness
ISO 20000/ITIL
Security Metrics
COBIT Framework
HIPAA
Remediation
Server Hardening
Network Redesign
Endpoint Security
Application Redevelopment
Active Directory and Group Policy Implementation
Breach Response
Compromise Assessment
Digital Forensics
Financial Fraud Risk Management
Trainings
Training
Certified Web Application Security Professional (CWASP)
Certified Payment Security Practitioner (CPSP)
Certified Professional Forensics Analyst (CPFA)
Certified Data Privacy Practitioner (CDPP)
Certified Information Systems Security Professional (CISSP)
Certified DevOps Security Practitioner (CDSP)
Secured Cloud Computing Practitioner (SCCP)
Certified Threat & Malware Analyst (CTMA)
Certified Security Operations Center Practitioner (CSOCP)
Certified Mobile Application Security Professional(CMASP)
Resources
Webinars
Blog
Security Advisories
Annual Report
Annual Report 2019
Annual Report 2021
Books
Whitepapers
Indian Personal Data Protection Bill
DevSecOps - A Concept note
Evolving Role Of CISO
NCA ECC Framework
The great Aussie PII: The latest Attacks on Aussie Businesses
Comparing Certain Privacy Laws
Compromise Assessment
Digital Forensics and Incident Response
ISO 27001 [ISMS]
SAMA Framework
GDPR_Compliance_Australia
NSA Cloud Defence
SOC Maturity Assessment
Blog
Company
Management Team
Press Centre
Clients
Careers
Hall Of Fame
CSR Policy
Contact Us
Security Advisories
Home
>
Research
> Security Advisories
Facebook
Twitter
Instagram
Mail
Security Advisory Digest March 2023 Edition 1.0
Security Advisory Digest February 2023 Edition 1.0
Security Advisory Digest January 2023 Edition 1.0
Security Advisory Digest December 2022 Edition 1.0
Security Advisory Digest November 2022 Edition 1.0
Security Advisory Digest October 2022 Edition 1.0
Security Advisory Digest September 2022 Edition 1.0
Security Advisory Digest August 2022 Edition 1.0
Security Advisory Digest July 2022 Edition 1.0
Security Advisory Digest May 2022 Edition 1.0
Security Advisory Digest April 2022 Edition 1.0
Security Advisory Digest February 2022 Edition 1.0
Security Advisory Digest January 2022 Edition 1.0
Security Advisory Digest November 2021 Edition 1.0
Security Advisory Digest September 2021 Edition 1.0
Security Advisory Digest July 2021 Edition 1.0
Security Advisory Digest June 2021 Edition 1.0
Security Advisory Digest April 2021 Edition 1.0
Security Advisory Digest March 2021 Edition 2.0
Security Advisory Digest March 2021 Edition 1.0
Security Advisory Digest January 2021 Edition 1.0
Research
Products
Blog
Blog
Security Advisories
Annual Report
Books
Firesec
Technology
Look who’s watching
September 12, 2022
Reading, Security Measures
In a commoditised world, where is individual privacy?
September 19, 2022
Data Privacy
The weaponisation of information
September 27, 2022
Research
Recent Tweets