Author:
Johnson Thiang

Johnson is an experienced security consultant specialized in conducting security assessments such as web/network/thick-client/mobile penetration testing as well as exploiting human weakness. He enjoys sports, robotics and anything related to technology in his free time. He holds the following certifications: (1) GIAC Penetration Tester (GPEN), (2) Offensive Security Certified Professional
New Cloud Compliance Standard: NIST 800-53 Rev 5 is Now Available on Warden
Horangi, a cybersecurity company that offers cloud security services, has mapped their Warden CSPM rules to ensure that users can meet the compliance requirements of NIST 800-53 rev 5. Read on to learn more.

Indonesia's ‘Personal Data Protection Bill’ is Now Available on Horangi Warden in Bahasa
Indonesia's new law expands comprehensive protection of personal data to around 275 million individuals. The "Personal Data Protection Bill (Act No. 27 or 2022)" regulates the handling of personal data by public and private entities, including those outside Indonesia. This compliance framework is now available on Warden, offering mapping assistance to help organizations adhere to the Act's requirements and reducing the risk of non-compliance.

New Compliance Standards including CCM, Korean ISMS-P, Thailand BOT, and more now Available on Horangi Warden
As your organization expands and grows, it is important to adhere to cybersecurity standards in different countries to stay compliant. We have added new cybersecurity control frameworks that will help you to define the processes and procedures that your organization must take to assess, monitor, and mitigate cybersecurity risk.

All-New Compliance Standards for Amazon AWS, Huawei Cloud & Microsoft Azure in Horangi Warden
Horangi Warden now supports AWS CIS 1.4, ISO27001, MAS-TRM 2021 and SOC2 compliance to more cloud service providers (CSPs). Read more below to know the complete list of compliance standards across the CSPs Warden supports.

Web App Pentesting With Horangi
It's no secret that the Internet can be a double-edged sword. It deeply enhances our daily lives but behind it are people who are fallible just like you and I. A critical vulnerability in a public web application is an open door for attackers.

Does Pentesting Make Sense For Small Businesses?
No organization is too small to be targeted. All an attacker needs is one entry point to find a way into something bigger. So how can small businesses use a penetration test strategically to fit their limited budget?

Android App Penetration Testing Made Easy
A quick penetration testing tutorial that provides a framework for security professionals to test the security of their Android applications.

Truth Behind The Fan
A small fan that can be powered through the USB port of a smartphone, can also be easily exploited as a surveillance device to support international cyber-espionage objectives.
AutoSploit: More harm or good for pentesting?
Tools enable a penetration tester to perform repetitive tasks faster in a more timely manner, achieving the objective in the quickest time without increasing the time spent or manpower to complete.
