Welcome to My New Information Security Blog
Disclaimer: This would be a long post (culmination of many old posts) with lot of different opinions, thoughts. If weaving is not right, please provide feedback on how it could be corrected. I had the good fortune of reading couple of threads by gentlemen whom I respect for their grounded advices. Their posts triggered some […]
Photo by Sean Musil on Unsplash This is a live post; it will undergo changes, which are captured in change log, provided at the end of this post. Being part of many external VAPT engagements, one thing was clear from outset — methodology is the key, but so are the information sources & tools for conducting the VAPT. […]
Follow My Blog
Get new content delivered directly to your inbox.