logo
  • Services
    • Application Security
          • Services
          • Web Application Penetration Testing
          • Mobile Application Pentesting
          • Web Services & API Assessment
          • Threat Modeling
          • Secure Code Review
          • Application Architecture Review
          • Resources
          • pdf

            Top 7 cyber security measures that enterprises shouldn’t neglect

            Read more
    • Network Security
          • Services
          • Network Vulnerability Assessment and Penetration Testing
          • Device Security
          • VoIP Vulnerability Assessment & Penetration Testing
          • Wireless Penetration Testing
          • Resources
          • pdf

            Top 7 Penetration Testing Companies in the USA

            Read more
    • Cloud Security
          • Services
          • Cloud Auditing
          • Cloud Pentesting
          • Resources
          • pdf

            Cloud Security Threats

            Read more
    • Breach & Attack Simulation
          • Services
          • Red Team Assessment
          • Dark Web Monitoring
          • Ransomware Simulation
          • Social Engineering Assessment
          • Assumed Breach Assessment
          • Resources
          • pdf

            7+ Major Reasons to Hire a Red Team to Harden Your App Sec

            Read more
    • Staffing Services
          • Services
          • Smart Shore Sourcing
          • Virtual CISO
          • Resources
          • pdf

            How to Choose a Penetration Testing Vendor Wisely?

            Read more
  • Solutions
      MANAGED SECURITY
      • Vulnerability Management as a Service
      • Vulnerability Remediation as a Service
      • Threat Intelligence as a Service
      • DevSecOps
      • Strategic Security Solutions
      Resources
      pdf

      World’s Worst Passwords: Is it time to change yours?

      Read more
  • Compliance
      REGULATORY COMPLIANCE
      • RBI Cyber Security Framework For Banks
      • SEBI Cyber Security & Cyber Resilience Framework
      • UIDAI – AUA KUA Compliance Security
      • RBI Guidelines for Payment Aggregators & Payment Gateways
      • RBI Cyber Security Framework For Urban Cooperative Banks
      • RBI Guidelines for cyber security in the NBFC Sector
      • SAR Audit for Data Localization
      STANDARD COMPLIANCE
      • ISO27001
      • PCI DSS
      • GDPR
      • Hipaa Audit
      • SOC2 Assessment
      Resources
      pdf

      HIPAA: A US Federal law to protect health information

      Read more
  • Resources
    • Blog
    • Datasheets
    • Case Studies
    • Whitepapers
    • Podcasts
    • Events
  • Company
    • About us
    • Partners
    • Careers
  • Contact
  • Services
    • Application Security
      • Web Application Penetration Testing
      • Mobile Application Pentesting
      • Web Services & API Assessment
      • Threat Modeling
      • Secure Code Review
      • Application Architecture Review
    • Network Security
      • Network VAPT
      • Device Security
      • VoIP Security
      • Wireless Testing
    • Cloud Security
      • Cloud Auditing
      • Cloud Pentesting
    • Breach & Attack Simulation
      • Red Team Assessment
      • Dark Web Monitoring
      • Ransomware Simulation
      • Social Engineering Assessment
      • Assumed Breach Assessment
    • Staffing Services
      • Smart Shore Sourcing
      • Virtual CISO
  • Solutions
    • Vulnerability Management
    • Vulnerability Remediation
    • Threat Intelligence
    • DevSecOps
    • Strategic Security Solutions
  • Compliance
    • RBI Cyber Security for Banks
    • SEBI Cyber Resilience
    • UIDAI – AUA KUA Compliance
    • RBI Guidelines for Payment Gateways
    • RBI for Urban Banks
    • RBI NBFC Cyber Guidelines
    • ISO27001
    • PCI DSS
    • GDPR
    • Hipaa Audit
    • SOC2 Assessment
  • Resources
    • Blog
    • Datasheets
    • Case Studies
    • Whitepapers
    • Podcasts
    • Events
  • Company
    • About Us
    • Careers
    • Partners
  • Contact
menu Schedule a meeting

Blogs

Everything Technical

blog-inner
Write For Us
Blogs Case Studies White Papers Datasheets Podcasts Events
News

Digital Defence is Now Strobes: A Message from Our CEO

Continue Reading
Red Team Threat Simulation

Red team vs Blue team: A CISO’s Guide to Offensive Security

Continue Reading
Data Breaches Infographic

Data Breaches in June 2024 - Infographic

Continue Reading
Application Security Penetration Testing

Mobile SDK Security: Effective Testing Methodology

Continue Reading
BFSI Penetration Testing

How Poor Cryptographic Practices Endanger Banking Software Security

Continue Reading
Data Breaches Infographic

Data Breaches in May 2024 – Infographic

Continue Reading
Application Security Cyber Security

Device Binding to Protect Your Banking and UPI Apps

Continue Reading
Cloud Security Penetration Testing

GCP Penetration Testing | Google Cloud Platform Security

Continue Reading
Cloud Security Penetration Testing

Azure Penetration Testing – Cloud Security Audits | Microsoft

Continue Reading
Cloud Security Penetration Testing

AWS Penetration Testing | Amazon Cloud Security

Continue Reading
Cyber Threat Data Breaches Infographic

Data Breaches in April 2024 – Infographic

Continue Reading
Application Security Penetration Testing Web Services & API Security

The Only API Penetration Testing Checklist You Need

Continue Reading
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
  • Last

Page 1 of 17

Tags
tagcloud banking Blockchain CISO cloud security cloud security controls cloud security posture compliance cyber attack cyberattacks cyber attacks cybersecurity cyber security cyber security awareness cybersecurity awareness cybersecurity trends cyber threats data breach data breaches data privacy data security devsecops e-commerce e-commerce security enterprise security healthcare hipaa audit hipaa compliance Malware mobile app security penetration testing pentesting Phishing phishing attacks ransomware ransomware attacks Red team red team assessment red teaming SMB social engineering threat simulation vapt vulnerability assessment vulnerability management

INDUSTRIES

  • BFSI
  • Healthcare
  • Government
  • Retail & eCommerce
  • Information Technology
  • Telecommunications

SERVICES

  • Application Security
  • Network Security
  • Cloud Security
  • Staffing Services
  • Threat Simulation
  • CERT-In Audit Services

SOLUTIONS

  • Managed Security
  • Threat Intelligence as a Service
  • Vulnerability Management as a Service
  • Vulnerability Remediation as a Service
  • Strategic Security Solutions

RESOURCES

  • Blog
  • Datasheets
  • Case Studies
  • Podcasts
  • Events

COMPANY

  • About
  • Partners
  • Careers
  • CERT-In New
  • White papers
  • Contact
  • Privacy Policy

WE ARE CERTIFIED

certin iso

TRUST WE GAINED

Trustpilot GoodFirms Clutch
Digital Defence Logo

© Digital Defence. All rights reserved.