Cyber Security , Data Security and GRC Blogs

Scan Email through DataForesight

It is possible to scan the emails for sensitive data hidden or transmitted in email to prevent the data breach. Emails are one of the major source of possible data breaches. The software supports...

Generate Report

Report generation is a major part of the exercise. The tool supports datatable based reports to fetch the details. Once can hide the columns and then download the desired reports in excel, csv.

MySQL

MySQL DB Scanning

DataForesight has the feature for scanning the database and the solution can scan SQL Server , Oracle , MySQL , PostGresql and MariaDB. In order to scan the mysql follow the below guidelines. use...

SMB Issue

SMB Credits 0 issue

It has been observed that many times DataForesight tool is not able to connect to the system using SMB option and the log file mentions SMB credit 0. This can happen due to below...

Qualys Exclusions for DataForesight

Qualys Exclusion for DataForesight

Exclude DataForesight files / urls from qualys automated scans Qualys is a leading vulnerability management solution across the globe and many organisations uses qualys for automated server and web application scanning. However while running...

DataForesight Advance Features

Dataforesight with Advance Features

Introduction of nginx webserver for faster scanning of data. Dataforesight has introduced new way of data scanning which is 40-50% faster for the organisations to find the data. Dataforesight now uses nginx web server...

RBI CyberSecurity Compliance

RBI CyberSecurity Requirements for Cooperative Banks

RBI has released cyber security requirements for Urban cooperative banks that can be found here. The requirements entails that all Cooperative banks falling under the ambit of RBI follows minimum basic cyber security requirements...

Requirements of PCIDSS

12 Requirements of PCIDSS

PCIDSS is one of the most critical cyber security compliance for the financial and financial supporting segments. PCI makes it a mandate that the business should follow security throughout the lifecycle of payments being...

Integrated Vulnerability Management

Integrated Vulnerability Management

Our most awaited Solution Integrated Vulnerability Management that integrates almost all leading vulnerability management solution like Qualys, Acunetix, Burp suite, HCL Appscan. It has the ability to integrate any solution that can support API...