Risky Context
  • Start Here
  • For Pentesters
  • For Auditors
  • Career Advice
  • Management
Sign in Subscribe

auditor

Spoke at CPE session, ISACA Muscat Chapter
where-is-the-risk

Spoke at CPE session, ISACA Muscat Chapter

What is a web application firewall, how does it work, how to audit it, how to assess risks around a web application firewall.
Read More
Sripati MS
6 places to look into when auditing or assessing risks in and around Web Application Firewall (WAF)
risk-assessor

6 places to look into when auditing or assessing risks in and around Web Application Firewall (WAF)

Web Application Firewall (WAF) has become a security imperative and absence of a WAF gets raised as a risk or an audit finding. However, many auditors and risk assessors miss some or all of the below 6 important areas related to WAF. So, here they are.
Read More
Sripati MS
Vulnerability, Control, and Risk are not same
where-is-the-risk

Vulnerability, Control, and Risk are not same

As Pentester, auditor, or risk assessor, it is important to understand difference
Read More
Sripati MS
Risks of a cybersecurity career
career-advice

Risks of a cybersecurity career

Cybersecurity is one of buzz-words promising the la-la land these days. Everyone is running towards it. However, it will help if one is aware of the 2 big risks.
Read More
Sripati MS
Risky Context © 2025
  • Sign up
Powered by Ghost