- Home
- /
- Blogs
Blogs
OT Security for the Concerned CISO
With predictions that attackers will weaponize operational technology (OT) environments by 2025, establishing robust OT security is imperative for organizations. When this level of threat comes into play, the success
Data-Centric Security: Protecting Your Organization’s Most Valuable Asset
There have been 4 great Industrial Revolutions in the modern world. The first one, back in 1784, focused on steam, water, and mechanization. The second one in 1870 had electricity
Future-Proofing ESG: Trends, Challenges and iValue’s Approach
There are two sides to the India growth story. A story deeply interlinked with the growing role of technology in our lives. One side calls for appreciation. 18 countries now
Implementing Phishing-Resistant MFA: Best Practices for Enterprises
Let’s take you through a new-age creation story. First came digital data. Then servers and accounts, to store and share and create more data. Along with accounts came usernames and
Understanding Phishing Attacks and How Phishing-Resistant MFA Can Help
Let’s take you back to 2015, when Ukraine was a much calmer place. Relatively, because the seeds of the current war were being planted then itself with Russia’s annexation of
Stay Cybersafe While Gift Shopping
Once upon a (quite recent) time, shopping used to be an extremely evocative, on-site experience. Go out, take a few mall selfies, try on hundreds of clothes for hours on
3 Most Common Cybersecurity Challenges Faced by Companies in Asia
We are smack bang in the epicenter of the Asian Century. That makes the APAC region a ‘Ground Zero’ for almost everything shaping today’s world. It’s the ‘Ground Zero’ for
Cybersecurity Horror Stories – Learn from Others’ Mistakes
Since it’s Halloween, let’s start by comparing and contrasting two of the more well-known figures of horror in recent pop culture. One feeds on human blood, the other on human
Tips To Stay Cybersafe This Cybersecurity Awareness Month
Most of us can agree that it was a much simpler time back in 2004. Yet, behind the scenes, the seeds were being planted for the increasingly connected world we
4 Ways a Cybersecurity Gap Assessment Can Help Reduce Your Business Risk
In today’s digital age, technology has become the backbone of every organization. As a result, IT & Cyber Security management is no longer a luxury, but a necessity. However, ensuring
How Exploitable Vulnerabilities Can Ruin Your Business
Exploitable vulnerabilities can have a devastating impact on businesses, leading to financial losses, reputational damage, and regulatory fines. In addition to the direct costs of remediation and recovery, organizations may
Building Safer Digital World
Since the 2000s, the information age has reinvented almost every aspect of our lives. Your phone is no longer just a calling device. The smartphone is your entry into a
What the recent CERT-In directives mean for businesses in India
As of July 1, businesses in India must comply with new regulations set forth by the country’s Computer Emergency Response Team of India (CERT-In) organization and the Ministry of Electronics
Socio-technical Cybersecurity – A POV
Cyber security is an important issue that affects everyone. Governments, businesses, and individuals all need to be aware of the dangers and take steps to protect themselves. Historically, cybersecurity practices
3 InfoSec lessons we are still learning from Star Wars
A long time ago, in a galaxy far, far away, a movie franchise captivated the world and introduced us to a new way of thinking about security. Star Wars taught
World Password Day: How strong is your password?
World Password Day is an annual event that raises awareness about the importance of strong passwords. It is celebrated on the first Thursday of May. This year, World Password Day
Top 4 cybersecurity trends for APAC companies in 2022
In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to IBM X-Force Threat Intelligence Index 2022, Asia was the most attacked region in 2021, receiving
MODERN MULTI-FACTOR AUTHENTICATION FOR YOUR ORGANIZATION
Data security and data privacy are two ongoing issues of prime concern for every organization. Data breaches are known to incur huge losses to organizations. According to Verizon’s 2020 Data Breach