Articles by

Varul Arora

What does an Effective Penetration Test consist of?

What does an effective penetration test consist of: IntroductionTo find the weak points and improve the defences...

What is a penetration testing methodology?

Penetration testing means that a penetration tester or an ethical hacker is testing the flaws or the...

What is IoT threat defence?

What is IoT threat defence: IntroductionIoT stands for Internet of Things which implies to machines which are...

How are cybersecurity policy affecting ICS and Scada?

We want to look at the cybersecurity policy affecting ICS and SCADA in this blog. A huge...

How to use OSINT Techniques for Penetration Testing?

During the penetration testing process, the penetration testers have to work with an immense amount of data....

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!