EncryptAsia

EncryptAsia EncryptAsia
Menu
  • Home
  • Services
  • Blog
  • Contact

Zumri Hadhi

Business Continuity

How to develop a Business Continuity​ Plan (BCP/DR)

Zumri HadhiJuly 18, 2019 6:19 PMJune 28, 2022

Sometime back, a person asked me about the implementation of the ISO standard for Business Continuity Management System (BCMS), through …

News

Efail, the PGP Encryption Attack Explained

Zumri HadhiMay 15, 2018 12:55 AMJune 28, 2022

[UPDATE] There are more updates being circulated on the vulnerability stating that it is not present in the standard, but …

News

Get to know “Meltdown and Spectre” attacks

Zumri HadhiJanuary 6, 2018 9:38 AMJune 28, 2022

Hello! Happy New Year! Welcome to 2018! We have just passed few days in the New Year and welcoming everyone …

News

Possible FAQs about the KRACK, Wi-Fi Attack

Zumri HadhiOctober 16, 2017 10:12 PMJune 28, 2022

Most of you must have heard about a latest Wi-Fi attack named KRACK lately. May be, you haven’t hear of …

Application Security

What is a Denial of Service (DoS) attack?

Zumri HadhiOctober 9, 2017 9:33 PMJune 28, 2022

I was having a conversation with a person who runs a company which depends on IT systems. He was saying …

News

What we learned from WannaCry?

Zumri HadhiMay 16, 2017 6:50 PMJune 28, 2022

Everyone is talking about the WannaCry ransomware attack lately. People discuss how it happened and how to protect you from …

Compliance

3 major benefits of implementing
ISO 27001

Zumri HadhiMarch 7, 2017 12:56 PMJune 28, 2022

Information security is the practice of protecting information of a particular entity. Information could be digital or physical. There are …

Compliance

10 steps to implement ISO 27001 in your organization

Zumri HadhiFebruary 19, 2017 2:34 AMJune 28, 2022

ISO 27001 is one of the most popular frameworks used in the world to protect information. Many organizations are willing …

Application Security

10 things you should do before launching a WebApp

Zumri HadhiFebruary 1, 2017 6:30 AMJune 28, 2022

Web applications are more popular among organizations and their customers. Many organizations provide web application access to their customers and …

Information Security

Let us hack you!

Zumri HadhiFebruary 1, 2017 5:57 AMJune 28, 2022

Hacking! The term itself is popular among us, but the exact same term has been a myth for some of …

Posts navigation

1 2 Next

Ready to get started?

Let's find out where you're vulnerable and improve your chance of winning.

View Services
Schedule Call

  • Blog
  • Contact Us

© 2022 EncryptAsia. All rights reserved.

Menu
  • Home
  • Services
  • Blog
  • Contact