Articles by
Varul Arora
CyberSecurity
What does an Effective Penetration Test consist of?
What does an effective penetration test consist of: IntroductionTo find the weak points and improve the defences...
Varul Arora - 0
CyberSecurity
What is a penetration testing methodology?
Penetration testing means that a penetration tester or an ethical hacker is testing the flaws or the...
Varul Arora - 0
CyberSecurity
What is IoT threat defence?
What is IoT threat defence: IntroductionIoT stands for Internet of Things which implies to machines which are...
Varul Arora - 0
CyberSecurity
How are cybersecurity policy affecting ICS and Scada?
We want to look at the cybersecurity policy affecting ICS and SCADA in this blog. A huge...
Varul Arora - 1
CyberSecurity
How to use OSINT Techniques for Penetration Testing?
During the penetration testing process, the penetration testers have to work with an immense amount of data....
Varul Arora - 0
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!