While “less is more” being the strategy of CISOs behind consolidating networks and security, "more is more" seems to be the mantra cybercriminals continue to live by. As we look at our threat...
Nov 16, 2022
People, processes, and technology have long been the core pillars dictating how cybersecurity programs are managed, and with good reason: organizations need well-trained talent on their staff,...
Nov 07, 2022
Gone are the days when cyber security was merely a technical or niche issue to be dealt with by some small department in the basement. Today, cyber security is highly complex as it has to work with...
Nov 03, 2022
Due to companies' increased focus on digital initiatives, their attention on cybersecurity is being reduced, which is alarming. According to the Identity Security Threat Landscape Report by CyberArk...
Apr 21, 2022
Incident response (IR) is when companies call in a team in the aftermath of a breach to limit the damage and prevent an attack from spreading. At Kaspersky, IR is handled by the Global Response...
Jan 03, 2022
In recent trends, threat actors are taking advantage of pandemic situation to trick the users to give up their sensitive information by taking advantage of the interest associated with recent novel...
May 19, 2020
Since the start of the COVID-19 pandemic, the World Health Organization (WHO) has seen a dramatic increase in the number of cyber attacks directed at its staff, and email scams targeting the public...
Apr 27, 2020
A new report by Morphisec, a cybersecurity startup from Israel, has discovered that a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass MS Code Integrity Guard...
Mar 20, 2018
I do not agree with this view. Information Security function has been ever evolving since its conception. However, depending on the size of the organization and the way the security function or the...
Mar 13, 2018
Developing digital skills is probably the biggest impediment to the adoption of new technologies in enterprises. The same holds true for finding and retaining cybersecurity talent. According to a...
Feb 26, 2018
*/ Today, Tribune carried a story showing how easy it was to get someone to hack into the Aadhaar database by paying only INR500 to instantly get personal details of any individual, submitted to the...
Jan 04, 2018
“The perfect security for a CISO is no compromise security which the end user does not come to know”
Is the demand for your solutions in a country like India fairly secular or is it restricted to a few specific domains? Lot of enterprises are changing their current providers that works...
Aug 10, 2017
73: The percentage of the respondents in India who estimated their organization’s losses due to economic crime to be up to USD 1 million in 2016, according to PwC’s Global Economic Crime Survey 2016...
Jun 21, 2017