How zero trust can play a pivotal role in digital transformation

Chief Risk Officers often seek transformation programs that offer visibility and insights while these are getting…

Why do hackers love to target backups?

Cybersecurity: Technologies to Watch in 2023

Imagine a patient is under doctor?s orders to use a wearable device. The device monitors the…

Compliance requirements for startups in India

India owns the third-largest startup ecosystem in the world, valued at $340.79 billion. With a YoY…

New Threat Trends – “More is More” the mantra cybercriminals live by

Best practices to secure your organisation

In tech industries critical messages need to be repeated often. Sometimes they can be complicated, so we reach…

Zero Trust model shows signs of maturity as Dx efforts intensify: Study

As the emphasis on digital transformation has increased, the Zero Trust concept is increasingly gaining traction…

Zero Trust model shows signs of maturity as Dx efforts intensify: Study

As the emphasis on digital transformation has increased, the Zero Trust concept is increasingly gaining traction…

75% of India’s top 100 Android apps are vulnerable: Study

Cybercrime industry thriving on ransomware DIY tools: Study

Even cybercriminals are embracing subscription-based business models aggressively, as many illicit organisations are now providing Ransomware-as-a-Service…