Security Articles

Wed
18
Oct

Third Party Risk Assessment – Shared Assessment Methodology and the challenges during Assessment

The vendor risk assessment is considered important in this world considering the increase of cybersecurity threats. Vendor Risk Management (VRM) is the process in order to ensure that their vendors does not create any loss to the business in any form (like financial loss, reputation loss, data loss etc.). This article will throw some light on challenges faced while conducting assessment using Shared Assessment Methodology and their phases along with references to ISO 27001:2013.
 

What is Shared Assessment Methodology?

  1. This is considered one of the trusted source for any third party risk assurance.
  2. This methodology creates efficiency and costs savings to effectively manage the vendor risk management lifecycle.
Mon
09
Oct

SWIFT Customer Security Program

SWIFT’s Customer Security Programme (CSP) has been established to support customers in the fight against cyber-fraud. Its key objectives are
 

1) CSP will define an operational and security baseline that customers must meet for the SWIFT customer infrastructure

2) CSP will define an assurance framework to ensure SWIFT customers comply with the security requirements

3) CSP will reinforce cybersecurity intelligence sharing

4) CSP will work to improve transaction pattern detection for SWIFT customers

5) CSP will be applicable to both SWIFT products and services as well as third-party software products/services

Tue
03
Oct

GDPR – A practical challenges of data classification

GDPR – A practical challenges  of data classification

The organizations' have become dependent on customer data as it is being treated as supreme wealth. The data is globally accessible from everything and everywhere, from legacy applications, web interfaces, big data files shares and more importantly the messaging system. The data leakage of key information is considered as potential risk for not conforming to the local regulation that leaves the company facing huge penalty and regulatory issues. Data classification, labeling and protecting the customer data are the key activities of data owner's.

Thu
28
Sep

How to Exclude False Positive(FP) in Qualys Web Application Scan(WAS)

At times, there are findings/detections reported by Qualys WAS against URLs that are, in fact, not vulnerable and in such case, the detected issues come under the category of false positive. If these false positives are not filtered/ignored at the root i.e. in the Qualys WAS portal they would keep appearing again and again in subsequent reports.
 
The purpose of this article is to list out the steps that would be helpful in filtering out the false positives from the reports of Qualys WAS, which in turn sets application and security team free from the unproductive job of removing the FP at their end.
 
There are two approaches to deal with FP in Qualys WAS. Based on the application’s requirement the appropriate solution approach can be chosen.
 

Thu
28
Sep

Gazer: A Stealthy Backdoor Attack

Gazer is a highly advanced piece of malware spotted by ESET in one of their new researchers. This new malware campaign is targeted against ministries, consulates, and embassies around the world. According to the reports, Gazer has managed to infect a number of computers worldwide, with the most victims being located in Europe. According to ESET's report, it has been active since 2016. 
 
Tue
26
Sep

Authentication and authorization flow of a web-application protected by Oracle Access Manager

Here are the steps explaining what happens while a user tries to access a web-application resource which is protected by Oracle Access Manager (OAM) server. I have included few OAM components as well while explaining the flow. In this example. Have considered custom login page placed at application's end. The diagram has the pictorial view of all the steps explained below.
 
 
 
 
 
 
 
  1. A user trying to access an application's web-resource protected by OAM server. Web server intercepts the request.
  2. Web server forwards the request to OAM server.
Mon
25
Sep

Public cloud security simplified with CWPP

Cloud Workload Protection Platforms (CWPP)
Organizations are rapidly adopting public cloud services like Amazon Web Services, IBM Cloud, Microsoft Azure, Rackspace Clouds etc., so as to extend business agility, scalability and cost efficiency. The advantages provided by the public cloud will no longer be ignored as competitive pressures accelerate mainstream business adoption. But, relinquishing control over sensitive data might place companies at risk of an inadequate data security compliance audit or the consequences of a data breach. These security concerns and increased risks are the leading obstacles to public cloud adoption.
 
Sun
24
Sep

Password managers and why you should use it?

Password managers and why you should use it?
Gone are the days, when we needed to store the most valuable thing in a locker(physical safe). Now, most of the valuable assets we have now are protected digitally with a password string, not with a physical safe. So anyone located anywhere in the world can access it given the password is known, or can be inferred.
 
The “password(s)” have now become so crucial that it may impact you gravely if handed over to some malicious person. So the password security should be kept in mind.

Password Security

Thu
14
Sep

How to be safe with IoT?

 How to be safe with IoT?
IOT device defines as any object connected to the internet. Examples include TV, Smart cars, Cameras, Door locks (including ones with Bluetooth), Medical Devices, Lights, Fitness Bands., Washing Machines, Coffee Maker, Other Daily appliances. Basically, if you have any home appliance is connected to the Internet connection, and then it becomes an IOT device.
 
Thu
14
Sep

Web applications & Need for Session Affinity

Is your application deployed on multiple data centers to allow high availability of the application and minimize any kind of outage (planned/unplanned) any impact on end users?
 
Do you think this is enough?
 
Are the users still complaining of abrupt & forceful session expiry?
 
Are you struggling to stick the user sessions to a data center (where the user session was initially created)?
 
The solution is Site Affinity or Session Stickiness or Data Center Affinity.
 
Let's talk about using a real life scenario.
 

Scenario: 

Pages

Subscribe to RSS - Security Articles