The Personal Data Protection Bill, 2019 – All you need to know

Right to privacy is a fundamental right. According to Nasscom's recent publication 'The future of internet in India'; by 2020 - 75% of new internet users growth in India to come from rural areas - consuming content in local languages, preferring videos over text, accessing internet via mobile. India's internet user growth expected to be... Continue Reading →

Cyber security leaders need fraud prevention with digital business

Digital transaction and consumer’s online presence Technology advancements has benefited both business and consumer by adopting digital technologies. With increase in adoption of smart phones and smart apps – the fraudulent activities has also exploded. Frauds such as identity thefts, merchant and triangulation frauds, affiliate and clean frauds, phishing, pagejacking, and counterattacks occur during online... Continue Reading →

Cyber Security Operations with Humans and Machines

Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should've noticed in market most of the cyber security product vendors using terms such as 'Artificial Intelligence', 'Machine Learning', 'Behavioral Analytics', 'Automated Workflow', etc,. Likewise system integrator, managed security service providers has explored possible use-cases to have 'machine... Continue Reading →

Web Isolation Recommendations and Benefits

Gartner Recommendations Gartner listed the following recommendations for an isolation platform should be able to do. Does not require a local client/agent.Uses an industry-standard web rendering engine that is kept up to date with changes in HTML5.Supports plug-ins, including PDF and Flash.Supports cloud SaaS applications such as Office 365 or G Suite.Provides a remote viewer... Continue Reading →

Stay away from attacks with Web Isolation

What is Web / Browser Isolation The technology essentially is a mini browser environment. It does all the web browsing on behalf of the user and then renders the content back to the end user.   This way the actual user's client browser just sees a rendered screen rather than all the native web content it... Continue Reading →

Part 3 : Zero Trust Network Access (ZTNA)

Zero trust network access is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. In order to achieve this there is no single specific technology is associated with zero... Continue Reading →

Blog at WordPress.com.

Up ↑