Multi-Tier Cloud Security Singapore Standard (SS584)

Multi-Tier Cloud Security Singapore Standard (SS584)

 The Multi-Tier Cloud Security (MTCS) Singapore Standard (SS) also known … Read More

Read More
Importance of Sampling in the Audit Process

Importance of Sampling in the Audit Process

  In a compliance audit process, forming an audit opinion or … Read More

Read More
Common Web Application Security Vulnerabilities or Threats

Common Web Application Security Vulnerabilities or Threats

 A Web Application is a computer program that utilizes Web … Read More

Read More
Top 10 PCI Compliance Webinars of VISTA InfoSec

Top 10 PCI Compliance Webinars of VISTA InfoSec

 PCI Compliance is a complex standard to navigate for Merchants … Read More

Read More
SAMA Cyber Security Maturity Model in a Nutshell

SAMA Cyber Security Maturity Model in a Nutshell

 Assessing the maturity level of an organization’s Cyber Security program … Read More

Read More
Types Of Vulnerability Assessment?

Types Of Vulnerability Assessment?

   What is a vulnerability assessment? A Vulnerability Assessment is … Read More

Read More
SOC 2 Privacy Criteria vs GDPR

SOC 2 Privacy Criteria vs GDPR

 Data Privacy has recently been the top focus point among … Read More

Read More
SAMA Cyber Security Framework in Brief

SAMA Cyber Security Framework in Brief

 Cyber Security has for long been a huge threat for … Read More

Read More
6 reasons Why Penetration Test is Important

6 reasons Why Penetration Test is Important

   What is Penetration Testing? A Penetration Test is a … Read More

Read More
Benefits of  ISO 27001 Certification

Benefits of ISO 27001 Certification

 The International Organization for Standardization (ISO) is a global standard … Read More

Read More
Guide to Web Application Penetration Testing

Guide to Web Application Penetration Testing

 We have covered the process of Penetration Testing in other … Read More

Read More
What to expect from the New York Privacy Act?

What to expect from the New York Privacy Act?

 In the recently proposed bill of the New York Privacy … Read More

Read More
Guide On ISO 27001 Controls

Guide On ISO 27001 Controls

 ISO 27001 or ISO/IEC 27001:2013 is an international standard created … Read More

Read More
Everything you need to know about ISO 27001 Standards

Everything you need to know about ISO 27001 Standards

 The International Organization for Standardization (ISO) is a global organization … Read More

Read More
Do we need a CPA firm for SOC Attestation?

Do we need a CPA firm for SOC Attestation?

 Emerging technology and growing trends of outsourcing critical business operations … Read More

Read More
RBI to set stringent rules to regulate the Digital Payment Security Controls

RBI to set stringent rules to regulate the Digital Payment Security Controls

 Given the proliferating cybercrimes in the Banking and Financial industry, … Read More

Read More
Why is GDPR Risk Assessment essential for Compliance?

Why is GDPR Risk Assessment essential for Compliance?

 Organizations looking to achieve GDPR Compliance are required to conduct … Read More

Read More
PCI SAQ – What is it and to whom it applies?

PCI SAQ – What is it and to whom it applies?

   Transcript Hello and welcome to our next in line … Read More

Read More
PCI Compliance Levels for Merchants & Service Providers

PCI Compliance Levels for Merchants & Service Providers

 The Payment Card Industry Data Security Standard (PCI DSS) outlines a set … Read More

Read More
What is GDPR Data Flow Mapping?

What is GDPR Data Flow Mapping?

 Data Privacy laws around the world have levied stringent obligations … Read More

Read More
Different HIPAA Compliance Challenges and Ways to tackle them

Different HIPAA Compliance Challenges and Ways to tackle them

 Maintaining compliance has always been a huge challenge for most … Read More

Read More
Revised Technology Risk Management Guidelines released by MAS

Revised Technology Risk Management Guidelines released by MAS

In the wake of growing cyber-attacks in recent years which targeted multiple IT service providers, the Monetary Authority of Singapore on Monday 18th January issued revised Technology Risk Management guidelines. Read More

Read More
What does the SOC2 Report cover?

What does the SOC2 Report cover?

 Businesses often outsource services related to information technology and cloud … Read More

Read More
Why is PCI DSS Training Important?

Why is PCI DSS Training Important?

 Credit cards and debit cards provide great convenience to consumers … Read More

Read More
PDPA Compliance

PDPA Compliance

 Many International Regulatory Bodies are today focusing on the protection … Read More

Read More
Compliance Requirements For Community Banks

Compliance Requirements For Community Banks

 In today’s global marketplace, Banking and Financial Institutes are greatly … Read More

Read More
VISTA InfoSec Celebrating Glorious 16th Anniversary

VISTA InfoSec Celebrating Glorious 16th Anniversary

 We are thrilled to announce that VISTA InfoSec has crossed … Read More

Read More
Everything You Need To Know About COSO Framework

Everything You Need To Know About COSO Framework

 The 2013 COSO Framework is a model designed to evaluate … Read More

Read More
GDPR Compliance in Canada For Canadian Business

GDPR Compliance in Canada For Canadian Business

 The General Data Protection Regulation (GDPR) in Canada and the … Read More

Read More
Why should Process Integrity be a part of your SOC2 Audit?

Why should Process Integrity be a part of your SOC2 Audit?

 An organization pursuing SOC 2 Compliance is required to comply … Read More

Read More
Infographic-Implication of GDPR Compliance on EU Citizen & Business

Infographic-Implication of GDPR Compliance on EU Citizen & Business

 The General Data Protection Regulation Act introduced applies to all … Read More

Read More
Ways to tackle Credit Card Fraud with PCI DSS Compliance in the UK

Ways to tackle Credit Card Fraud with PCI DSS Compliance in the UK

 In today’s digital world, the new payment technology has brought … Read More

Read More
Tips for an E-commerce Business To Achieve PCI DSS Compliance

Tips for an E-commerce Business To Achieve PCI DSS Compliance

 PCI DSS Compliance is a mandate for every organization dealing … Read More

Read More
Importance of GDPR in the Retail Sector

Importance of GDPR in the Retail Sector

 Technology has drastically transformed the way the retail industry works … Read More

Read More
What is a SOC 1 Report?

What is a SOC 1 Report?

 At VISTA InfoSec, we hear this very good question from … Read More

Read More
Infovore CTF

Infovore CTF

 We start with another boot2root machine from Vulnhub. This machine … Read More

Read More
InfoSec Prep: OSCP

InfoSec Prep: OSCP

 This virtual machine I found on Vulnhub – InfoSec Prep: … Read More

Read More
PCI DSS Compliance For Remote Access During COVID-19 Pandemic

PCI DSS Compliance For Remote Access During COVID-19 Pandemic

 As the COVID-19 pandemic continues to spread across the world, … Read More

Read More
A Detailed Guide on HTML Injection

A Detailed Guide on HTML Injection

 HTML is considered as the skeleton for every web application, … Read More

Read More
A Guide to NESA’s Audit & Compliance Process

A Guide to NESA’s Audit & Compliance Process

 NESA ‘s IAS Standards are a threat-based approach that guides … Read More

Read More
Testing The Business Continuity Plan

Testing The Business Continuity Plan

 Business Continuity Plan is a process of recovery and prevention systems … Read More

Read More
Fetching Database on Mobile Devices via Terminal

Fetching Database on Mobile Devices via Terminal

 One of the most common and probably the most essential … Read More

Read More
What are the Best Practices for Securing E-commerce Business?

What are the Best Practices for Securing E-commerce Business?

 E-commerce businesses have exponentially flourished over the past decade. With … Read More

Read More
What is Insufficient Logging & Monitoring and How Can it Be Prevented?

What is Insufficient Logging & Monitoring and How Can it Be Prevented?

 When it comes to exploitation of cybersecurity, insufficient logging and … Read More

Read More
Importance of Business Continuity Plan

Importance of Business Continuity Plan

 When a disaster strikes it just strikes hard without giving … Read More

Read More
PCI DSS 4.0 Updates

PCI DSS 4.0 Updates

 PCI DSS 4.0 is the latest version of the Payment … Read More

Read More
A brief introduction to HIPAA Compliance

A brief introduction to HIPAA Compliance

 The Health Insurance Portability and Accountability Act of 1996 which … Read More

Read More
CCPA Compliance Guide

CCPA Compliance Guide

 The California Consumer Privacy Act (CCPA) is the first of … Read More

Read More
NESA’s Compliance Enforcement and Penalties

NESA’s Compliance Enforcement and Penalties

 NESA Standards have been developed based on the existing standards … Read More

Read More
Brief Insight on what is NESA Compliance

Brief Insight on what is NESA Compliance

 Advancement in the field of Information Technology has radically transformed … Read More

Read More
NESA’s IAS Standards & Security Controls

NESA’s IAS Standards & Security Controls

 The National Electronic Security Authority (NESA) was established in 2012 … Read More

Read More
Government brings Cooperative banks under RBI supervision for better regulation

Government brings Cooperative banks under RBI supervision for better regulation

 The Indian Banking Industry has drastically revolutionized and achieved new … Read More

Read More
SOC2 vs ISO 27001 Certification

SOC2 vs ISO 27001 Certification

 When it comes to Information Security, companies struggle with the … Read More

Read More
PCI DSS Scoping and Segmentation

PCI DSS Scoping and Segmentation

 PCI DSS Security Standards have for long been a hot … Read More

Read More
SOC 2 Type 1 vs Type 2

SOC 2 Type 1 vs Type 2

 The prevalence of cyber security attacks and data breach in … Read More

Read More
Insight on the BHIM data breach case

Insight on the BHIM data breach case

 In the recent few months, apart from the Corona Virus … Read More

Read More
Types of Penetration test

Types of Penetration test

 Penetration test or Pen test as we call it, is … Read More

Read More
Social Engineering: How to Recognize Phishing Emails

Social Engineering: How to Recognize Phishing Emails

 According to Wikipedia, Social engineering, in the context of information … Read More

Read More
PCI PIN – A Quick Intro

PCI PIN – A Quick Intro

 The Payment Card Industry Security Standards Council (PCI SSC), published … Read More

Read More
Remote Assessments & Corona Virus

Remote Assessments & Corona Virus

 Guidelines from PCI SSC has been issued for the very … Read More

Read More
Types of Social Engineering Attacks

Types of Social Engineering Attacks

 In social engineering, an attacker gathers information by interacting with … Read More

Read More
Local File Inclusion (LFI)

Local File Inclusion (LFI)

 What is Local file inclusion (LFI)? File Inclusion attack is … Read More

Read More
Mobile Application Security

Mobile Application Security

 Nowadays Mobile device has evolved from simple communication devices to … Read More

Read More
Top 11 Benefits of having SOC 2 Certification!

Top 11 Benefits of having SOC 2 Certification!

 1. Brand Protection :– SOC 2 keeps your brand reputation … Read More

Read More
Selecting SOC 2 Principles

Selecting SOC 2 Principles

 Once you as an organization are determined to pursue SOC … Read More

Read More
SOC 1 Vs SOC 2 Report

SOC 1 Vs SOC 2 Report

 Which SOC Report Do I Need? As a service organization, … Read More

Read More
What is a Firewall Risk Assessment?

What is a Firewall Risk Assessment?

 A firewall risk assessment is a detailed assessment approach of … Read More

Read More
WHY SHOULD I DO SOC2?

WHY SHOULD I DO SOC2?

      Interesting question and rightly so… it’s expensive and … Read More

Read More