Jitendra Chauhan
  • Bangalore
  • India
  • iViZ Technosolutions Pvt Ltd
Share on Facebook

Jitendra Chauhan's Page

Profile Information

iViZ Technosolutions Pvt Ltd

Jitendra Chauhan's Blog

Top 5 Big Data Vulnerability Classes

Posted on September 15, 2014 at 8:30pm 1 Comment

Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and challenges and I happily accepted.…


Penetration Testing E-commerce Applications

Posted on September 15, 2014 at 8:30pm 0 Comments

Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible.

Why a conventional application penetration testing is not enough for E-commerce…


Must Know Business Logic Vulnerabilities In Banking Applications

Posted on September 15, 2014 at 7:00pm 0 Comments

Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on. On one side, SQL Injection, XSS and CSRF vulnerabilities are still the top classes of vulnerabilities found by our automated scanning system, on the other hand however, there are a lot of…


5 Best Practices to secure your Big Data Implementation

Posted on August 20, 2013 at 7:30pm 0 Comments

Here are the key best practices that organizations need to adopt for securing their Big Data.

 1. Secure your computation code:

  • Proper access control, code signing, auditing should be implemented to secure computation code.
  • Implement a strategy to protect data in presence of an untrusted computation code.

2. Implement comprehensive end-point input validation/filtering:

  • Implement validation and filtering of input…

Comment Wall

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

  • No comments yet!

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service