Decryption tool for the Maze ransomware

Ransomware is a type of malicious software cyber actors use to deny access to systems or data. The malicious cyber actor holds systems or data hostage until the ransom is paid. After the initial infection, the ransomware attempts to spread to shared storage drives and other accessible systems. If the demands are not met, the... Continue Reading →

Recommendations to adopt Zero Trust principles

Zero Trust is an end-to-end approach to network and data security that encompasses identity, credentials, access management, operations, endpoints, hosting environments, and the interconnecting infrastructure. 'Zero Trust Architecture provides a collection of concepts, ideas, and component relationships (architectures) designed to eliminate the uncertainty in enforcing accurate access decisions in information systems and services' NIST Operative... Continue Reading →

Cyber security leaders need fraud prevention with digital business

Digital transaction and consumer’s online presence Technology advancements has benefited both business and consumer by adopting digital technologies. With increase in adoption of smart phones and smart apps – the fraudulent activities has also exploded. Frauds such as identity thefts, merchant and triangulation frauds, affiliate and clean frauds, phishing, pagejacking, and counterattacks occur during online... Continue Reading →

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 - EU GDPR - "Notification of a personal data breach to the supervisory authority"; In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data... Continue Reading →

Blog at WordPress.com.

Up ↑