Our Blog

Read our latest blog posts

Development of a Language-Independent Microservice Architecture

In this blog we discuss how to create a language-independent microservice using Google's open source RPC and...

Continue reading

How does CloudSEK’s XVigil detect rogue, fake applications

XVigil reported over 2.4L fake apps on popular app stores, infringing on its clients copyrighted materials. How...

Continue reading

The Upsurge of Digital Fingerprints in Underground Marketplaces

What makes digital fingerprints valuable to cybercriminals and what are the preventive measures you can adhere to...

Continue reading

Why programming skills are essential for penetration testers

Experienced security professionals say that entry-level positions in security and hacking doesn't require programming skills. Is this...

Continue reading

What makes web applications an easy target for hackers?

Verizon Data Breach Investigation Report finds that web applications are the single most significant cause for data...

Continue reading

Weekly Cyber Trivia Quiz Contest #4

Cyber Trivia Quiz is here! Find out if you’re up-to-date on your cybersecurity news from across the...

Continue reading

Why you should be worried about a cyber pandemic that could...

This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber...

Continue reading

Worst cybersecurity strategies and how we can overcome them

A list of the worst cybersecurity practices and strategies that could be detrimental to your organizations and...

Continue reading

How to build a secure AWS infrastructure

Summary of the recommendations of AWS' Well-Architected Framework, with respect to design, delivery, and maintenance of secure...

Continue reading

Why monitoring the most popular P2P messenger should be a cybersecurity...

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly...

Continue reading