People is the most critical vulnerability in any organization

In this digital era, organizations do have world-class cyber security tools and certified experienced professionals to manage the technology to safeguard from any data breaches. Despite having adequate security controls and enforcement of IT security policies and procedures - we are still witnessing organizations compromised due to cyber attacks. Products are great, it solves most... Continue Reading →

Cost effective programs to enhance cyber security immune system

Organizations are enduring cost reduction initiatives in uncertain times, however security leaders have challenges to keep the business secure from growing cyber breaches. IT security leaders are looking for cost effective security programs that enhance their cyber security immune systems. This article focuses on below top five initiatives that business leaders should explore. #1 -... Continue Reading →

CISO should redefine corporate security strategy

Evolution of the CISO The role for CISO has evolved in last two decades, In early year 2000 - organizations require security information officer to focus on regulatory compliance and interaction with external auditors and business stakeholders to define IT security requirements. They coordinate audits to ensure that business process are complaint. During the year... Continue Reading →

Social media addiction is injurious to mental health

In mobile first generations, the global youth population are born connected. According to Reuters Institute India Digital News Report, 68% of smartphone consumers devices to access online news. The traditional forms of news via broadcast media and print media are becoming outpaced by digital platforms – esp. social media platforms. In India Facebook and WhatsApp... Continue Reading →

Mobile applications require self-defensing capabilities

Software problems begin with errors made by coders Developers often lack security expertise and provide weight-age to the business process while developing client side applications such as mobile apps. With increased usage of smart phones and access to wireless internet keeps the application development market very busy. Organizations are moving towards digital platform and the... Continue Reading →

Decryption tool for the Maze ransomware

Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial infection, the ransomware attempts to spread to shared storage drives and other accessible systems. If the demands are not met, the... Continue Reading →

Enhance your SOC with Microsoft Security Graph Integration

The Microsoft Graph Security API simplifies integration with Microsoft and third-party security solutions. Using one endpoint, one software development kit (SDK), one schema, and one authentication mechanism, you can easily build integrated security applications, workflows, and analytics. Microsoft Graph is a collection of APIs that together provide a standard unified interface and schema for accessing... Continue Reading →

Recommendations to adopt Zero Trust principles

Zero Trust is an end-to-end approach to network and data security that encompasses identity, credentials, access management, operations, endpoints, hosting environments, and the interconnecting infrastructure. 'Zero Trust Architecture provides a collection of concepts, ideas, and component relationships (architectures) designed to eliminate the uncertainty in enforcing accurate access decisions in information systems and services' NIST Operative... Continue Reading →

Blog at WordPress.com.

Up ↑