A new report by Morphisec, a cybersecurity startup from Israel, has discovered that a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass MS Code Integrity Guard...
Mar 20, 2018
I do not agree with this view. Information Security function has been ever evolving since its conception. However, depending on the size of the organization and the way the security function or the...
Mar 13, 2018
I choose to agree that the Information Security (InfoSec) function should be independent of enterprise IT. It is a myth that InfoSec is limited to IT and information stored in IT infrastructure...
Mar 12, 2018
Developing digital skills is probably the biggest impediment to the adoption of new technologies in enterprises. The same holds true for finding and retaining cybersecurity talent. According to a...
Feb 26, 2018
*/ Today, Tribune carried a story showing how easy it was to get someone to hack into the Aadhaar database by paying only INR500 to instantly get personal details of any individual, submitted to the...
Jan 04, 2018
Is the demand for your solutions in a country like India fairly secular or is it restricted to a few specific domains? Lot of enterprises are changing their current providers that works...
Aug 10, 2017