Checkmate
  • Checkmate Home
  • NII Home
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Company

Month: October 2019

Securing and Auditing RPA (Remote Process Automation) Environment (Part 2)

October 22, 2019 Sumit Paraskar 0

1. Securing RPA: RPA introduces a new attack surface that can be leveraged to disclose, steal, destroy or modify sensitive data and/or high-value information, access unauthorized applications and systems, and [more]

Implementing and Auditing Cyber Security in Robotics (Part – 1)

October 10, 2019 Sumit Paraskar 0

Introduction: As technology and human intelligence are evolving, new products are being developed by humans. But the evolution comes with benefits and drawbacks. One of the new and evolving technology [more]

Search

"What investments make the most sense when it comes to application security?"


Register for our Application Security – State of the Nation report and fill in the survey!

Recent Posts

  • The California Consumer Privacy Act
  • Token Manipulation Attacks – Part 2 (Process of Impersonation)
  • Token Manipulation Attacks (Part 1: Introduction to Tokens and Privileges)
  • RPA (Robotic Process Automation) Use Cases (Part 3)
  • Securing and Auditing RPA (Remote Process Automation) Environment (Part 2)

Recent Comments

  • Jai Kumar Sharma on A Detailed Guide on OSCP Preparation – From Newbie to OSCP
  • Pradnesh Chavan on A Detailed Guide on OSCP Preparation – From Newbie to OSCP
  • Michael on Malware Development – Welcome to the Dark Side: Part 1
  • krishna yadav on Breach Response – Lessons learnt in the past one year
  • chan doi di bui on A Detailed Guide on OSCP Preparation – From Newbie to OSCP

Search

Copyright © 2019 | WordPress Theme by MH Themes