What Are The Risks Of Bring Your Own Device (BYOD) Application In Terms Of Information Security?
What Are The Risks Of Bring Your Own Device (BYOD) Application In Terms Of Information Security?

This article considers the risks of “ Bring Your Device” method that enables using personal mobile devices in business life in terms of information security and the policies that should…

Read More
Wordpress File Manager Plugin Vulnerability CVE-2020-25213
Wordpress File Manager Plugin Vulnerability CVE-2020-25213

A critical vulnerability was detected in WordPress's file management plugin, one of the most used content management systems. This vulnerability can lead to the complete hijacking of…

Read More
How to Protect From Cyber Attacks While Working From Home
How to Protect From Cyber Attacks While Working From Home

 During the pandemic, daily habits such as the workplaces, work conditions and work methods of the people around the world are changing. Various employers say their employees to…

Read More
Secure Software Development: SSDLC in Software Development
Secure Software Development: SSDLC in Software Development

As the developed software may be using in medical information systems, critical infrastructure systems and financial systems, it is essential to develop software securely. Increasing software security vulnerabilities reveals…

Read More
7 Main Threats that Target Companies
7 Main Threats that Target Companies

Do you think cyber attackers will only target large companies? Sorry, but you're wrong. Small businesses are also facing cyber threats as large companies. One common mistake small companies do…

Read More
6 Differences Between Vulnerability Analysis and Pentest
6 Differences Between Vulnerability Analysis and Pentest

Many people hear Pentest (penetration testing) and vulnerability analysis. Yet, these terms are often confused. This article is about what pentest and vulnerability analysis are, the differences between pentest…

Read More
10 Important Things While Choosing The Penetration Testing Company
10 Important Things While Choosing The Penetration Testing Company

What is Penetration Testing? Pentesting or penetration testing, in simple words, is an exercise carried out by a cyber-security expert that involves a series of tests to nail down any…

Read More