+91-141-2209655 [email protected]

Bulwark’s Blog

OWASP Top 10 – The Unsung Rescuer  

Technology in the current scenario is ever advancing. Every new day brings about new developments in this vibrant and turbulent tech industry. To sail through and develop successfully, an unbiased, genuine and easy-to-access source of information is needed. OWASP aims to educate developers, designers and business…

Data Breaches – Cyberspace Warfare 

Every battle in history has been known for its tactical approach, attacks & sacrifices. No two battles in history have been alike. The warfare in the cyberspace has followed the same modus operandi. Data Breaches can be termed as the modern-day, digital invasions that have…

DoS Attacks – Unruly weapon of Cyber Warfare

DoS attacks have been one of the most prominent attacks in the arsenal of cyber-attacks and unethical hacking. These attacks are becoming more potent and dangerous with the constantly evolving misuse of technology.   A Denial-of-Service or DoS attack occurs when legitimate users from accessing specific computer…

Cyber Crimes – An Alarming Reality

Cyber Crimes have no silver bullet solution. A layered defence is the only viable defence.   Technology in the past few decades has become an increasingly integral aspect of all the activities that take place at home or workplace. As the development in technology is progressing, the crime rates…

Software Vulnerabilities – Why are they significant?

In this age of digitalization, we have every information and service right on our computer screens. This gives us immense power and ease of service, but if this power is not handled carefully, this can have its own repercussions. The data that is stored offline is more secure…