The Personal Data Protection Bill, 2019 – All you need to know

Right to privacy is a fundamental right. According to Nasscom's recent publication 'The future of internet in India'; by 2020 - 75% of new internet users growth in India to come from rural areas - consuming content in local languages, preferring videos over text, accessing internet via mobile. India's internet user growth expected to be... Continue Reading →

Cyber security leaders need fraud prevention with digital business

Digital transaction and consumer’s online presence Technology advancements has benefited both business and consumer by adopting digital technologies. With increase in adoption of smart phones and smart apps – the fraudulent activities has also exploded. Frauds such as identity thefts, merchant and triangulation frauds, affiliate and clean frauds, phishing, pagejacking, and counterattacks occur during online... Continue Reading →

Cyber Security Operations with Humans and Machines

Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should've noticed in market most of the cyber security product vendors using terms such as 'Artificial Intelligence', 'Machine Learning', 'Behavioral Analytics', 'Automated Workflow', etc,. Likewise system integrator, managed security service providers has explored possible use-cases to have 'machine... Continue Reading →

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 - EU GDPR - "Notification of a personal data breach to the supervisory authority"; In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data... Continue Reading →

Deepfake – Seeing is no longer believing

What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes exploit this human tendency using generative adversarial networks (GANs), in which two machine learning (ML) models duke it out. One ML model... Continue Reading →

Threat modeling frameworks and methodologies

Threat modeling is a process by which organizations can shift their security approach from reactively plugging exploits to proactively and systematically understanding and addressing potential threats in the design stage. This process identifies potential threats to the system, data/asset exposure, logical/architectural vulnerabilities, and relevant security controls to help evaluate security decisions, serve as a guide... Continue Reading →

Blog at WordPress.com.

Up ↑