• Services
    • Application Development
    • Cyber Security
      • Essential Security Hygiene
      • Beyond Basic Security Hygiene
    • Managed IT
  • About
  • Blogs
  • Whitepapers
  • Webinar
  • Contact us

MobiKwik Suffers Major Breach — KYC Data of 3.5 Million Users got leaked.
April 07, 2021

MobiKwik Suffers Major Breach — KYC Data of 3.5 Million Users got leaked.

How Sumeru Threat Meter is  helping financial organisations to rise above the basic security hygiene?
April 05, 2021

How Sumeru Threat Meter is helping financial organisations to rise above the basic security hygiene?

Let’s bust the myths of DevSecOps
April 05, 2021

Let’s bust the myths of DevSecOps

How hackers search and hijack sensitive databases?
April 05, 2021

How hackers search and hijack sensitive databases?

Want to know how DevSecOps can significantly improve your SDLC and security culture? Watch this webinar now!
March 25, 2021

Want to know how DevSecOps can significantly improve your SDLC and security culture? Watch this webinar now!

3 effective tips for a new CISO who is set to embark on their security journey
March 05, 2021

3 effective tips for a new CISO who is set to embark on their security journey

Nissan Source  Code Leaked via  Misconfigured Git  Server
February 19, 2021

Nissan Source Code Leaked via Misconfigured Git Server

Want to be an invincible CISO? Watch this webinar.
February 12, 2021

Want to be an invincible CISO? Watch this webinar.

Juspay Data Dumped Online – 35 million records customer data sold on dark web
February 08, 2021

Juspay Data Dumped Online – 35 million records customer data sold on dark web

How can you make your Azure Storage secure?
February 02, 2021

How can you make your Azure Storage secure?

How attackers are spreading“Coronavirus map” malware map?
February 02, 2021

How attackers are spreading“Coronavirus map” malware map?

How to create Private EC2 Instance in AWS?
February 02, 2021

How to create Private EC2 Instance in AWS?

Subdomain Enumeration: Expanding a Target’s Attack Surface
January 15, 2021

Subdomain Enumeration: Expanding a Target’s Attack Surface

What can you find on Github?
December 20, 2020

What can you find on Github?

Steps to create a secure S3 bucket
December 15, 2020

Steps to create a secure S3 bucket

Protect your privacy online with TOR
December 10, 2020

Protect your privacy online with TOR

Rise above basic security hygiene with Sumeru’s Red Team Assessment webinar
December 07, 2020

Rise above basic security hygiene with Sumeru’s Red Team Assessment webinar

DevSecOps CI/CD using Jenkins on a PHP codebase
December 05, 2020

DevSecOps CI/CD using Jenkins on a PHP codebase

What are the most common security mistakes committed by employees
December 05, 2020

What are the most common security mistakes committed by employees

Build a robust security foundation with our effective SMB Security Checklist today
November 15, 2020

Build a robust security foundation with our effective SMB Security Checklist today

Top Cloud Security Challenges and Their Solutions
November 10, 2020

Top Cloud Security Challenges and Their Solutions

Understanding Trends & Disruption of Cloud Security in COVID-19 Era
November 06, 2020

Understanding Trends & Disruption of Cloud Security in COVID-19 Era

Let’s talk about your project.