458 Montrave Ave
L1J 4S7 Oshawa , ON
+1 647-425-3216
Cloud Penetration Testing
  • Posted by: CISS
  • Category: Cloud Security

Cloud Penetration Testing

Read more
Ansible, Kibana, Kafka, Storm, Punchlet
  • Posted by: CISS
  • Category: Uncategorized
ansible-red-hat-blog-top

Ansible: Ansible, an open source and yet so powerful IT automation tool by Red hat. Which can be easily easily grasp by your IT team. Ansible is so simple even if you are not an Linux guru still you can easily use it. Its powerful automation lets you simply most complex deployment in simple manner….

Read more
SCADA / ICS / Industry 4.0 Penetration Testing
  • Posted by: CISS
  • Category: Uncategorized

SCADA / ICS / Industry 4.0Penetration Testing

Read more
PCI-DSS
  • Posted by: CISS
  • Category: PCI DSS, Uncategorized

PCI-DSS Quick snapshot on the 12 requirements standard: Configuring your Secure Network Safeguard cardholder data by implementing/maintaining a firewall. Do not use vendor-supplied defaults for system passwords and other security parameters. Must Protect Cardholder Data Encrypt cardholder data that is transmitted across public networks. Protect stored cardholder data. Manage up-to-date system Vulnerabilities Use and regularly…

Read more
Mobile App Penetration Testing
  • Posted by: CISS
  • Category: Uncategorized

Mobile AppPenetration Testing

Read more
IoT Penetration Testing
  • Posted by: CISS
  • Category: Uncategorized

IoT Penetration Testing

Read more
Network Penetration Testing Services
  • Posted by: CISS
  • Category: Uncategorized

Network Penetration Testing Services

Read more
API & Web Application Penetration Testing Services
  • Posted by: CISS
  • Category: Uncategorized

API & Web Application Penetration Testing Services

Read more
Planning on the Security strategy
  • Posted by: CISS
  • Category: Uncategorized
Locking up and chaining up

Corporate or SME, no matter what is the nature of your business, having well organized security strategy is the key to business continuity. Eventually the other two pillar, confidentiality and integrity of the security triage comes handy when you have a robust security strategy. In our managed Cyber and Information Security services, CISS model, we…

Read more
Security Management
  • Posted by: CISS
  • Category: Uncategorized
cyber-information-security-services-mesh-1

Security Management is a continuous process. Its not like once a week tidying up your wardrobe. Its something that should be enabled and monitored round the clock. Security focused enterprise assets management is to mainly to ensure the triage. Unusually its comes to mind that if you work round the clock just to stay secure…

Read more
  • 1
  • 2