- Home
- /
- Blogs
- /
- Page 2
Blogs

What the recent CERT-In directives mean for businesses in India
As of July 1, businesses in India must comply with new regulations set forth by the country’s Computer Emergency Response Team of India (CERT-In) organization and the Ministry of Electronics

Socio-technical Cybersecurity – A POV
Cyber security is an important issue that affects everyone. Governments, businesses, and individuals all need to be aware of the dangers and take steps to protect themselves. Historically, cybersecurity practices

3 InfoSec lessons we are still learning from Star Wars
A long time ago, in a galaxy far, far away, a movie franchise captivated the world and introduced us to a new way of thinking about security. Star Wars taught

World Password Day: How strong is your password?
World Password Day is an annual event that raises awareness about the importance of strong passwords. It is celebrated on the first Thursday of May. This year, World Password Day

Top 4 cybersecurity trends for APAC companies in 2022
In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to IBM X-Force Threat Intelligence Index 2022, Asia was the most attacked region in 2021, receiving

MODERN MULTI-FACTOR AUTHENTICATION FOR YOUR ORGANIZATION
Data security and data privacy are two ongoing issues of prime concern for every organization. Data breaches are known to incur huge losses to organizations. According to Verizon’s 2020 Data Breach

SASE: The future of Cloud Security
Over the last year, remote access and cloud computing access solutions saw an uptick in their adoption across global businesses. Driven by distributed workflows and a remote workforce, the enterprise

THE FUTURE OF DATA CENTER SECURITY
Human life online is beginning to merge with the way it exists offline. Today, individuals are living in a digital world than ever before, driven by the internet, smart devices

CALL FOR HEIGHTENED CYBERSECURITY VIGILANCE
The ongoing Russia-Ukraine conflict is mired in disinformation, propaganda, and cyber aggression like never before. Apart from the boots on the ground in Ukraine, the digital assault has been in

KEY COMPONENTS OF AN EFFECTIVE THREAT INTELLIGENCE PROGRAM
The presence of large volumes of data at the organization’s Security Operation Centre (SOC) that are awaiting analysis, combined with a shortage of competent analysts, indicates that security concerns are

KEY ELEMENTS TO BE CONSIDERED BY BUSINESSES WHILE ADOPTING NEW-AGE SIEM SOLUTIONS
Although SIEM (Security Information and Event Management) tools have been around since 2006, when Gartner coined the term, these legacy tools have been evolving rapidly in recent years. Legacy SIEM

ZERO-TRUST APPROACH TO CYBERSECURITY GAINS FURTHER TRACTION IN 2022
Today, the prevailing hybrid working culture, cloud technologies, edge-computing, IoT, and other factors have given rise to newer business models where employees and business partners have ubiquitous access to the

MODERN MULTI-FACTOR AUTHENTICATION FOR YOUR ORGANIZATION
Data security and data privacy are two ongoing issues of prime concern for every organization. Data breaches are known to incur huge losses to organizations. According to Verizon’s 2020 Data Breach

MULTI-FACTOR AUTHENTICATION FOR THE NEW BANKING ERA
Over the last decade, the banking sector experienced tremendous digital growth, technological advancement, and globalization of services. But, it was over the past year that the banking sector realized the

POWERING YOUR DIGITAL WORKFORCE – DO’S AND DON’TS FOR THE NEXT NORMAL
The COVID-19 pandemic forever changed the face of business worldwide. From social distancing to work from home, employee safety and welfare was utmost priority as organizations embraced remote working. Overnight,

DATA PRIVACY MANAGEMENT IS THE NEED OF THE HOUR FOR BOTH BUSINESSES AND CUSTOMERS
Human life online is beginning to merge with the way it exists offline. Today, individuals are living in a digital world than ever before, driven by the internet, smart devices

SASE: THE FUTURE OF CLOUD SECURITY
Over the last year, remote access and cloud computing access solutions saw an uptick in their adoption across global businesses. Driven by distributed workflows and a remote workforce, the enterprise

HUMAN FIREWALL – YOUR MOST IMPORTANT SECURITY ASSET
Human Firewall – Your Most Important Security Asset !! When it comes to cybersecurity, organizations look to tools and protecting their digital assets. But the most overlooked and unpredictable asset