Security
Securing Enterprise Networks by using endpoint security
July 15, 2022India witnessed the digital revolution a long time ago and is in the process to digitize a large number of things. India's economy is taking full advantage of digitization in ...
To stop cyberattacks, use the most trusted security networks
April 5, 2022Cyber security is a multi-domain problem that necessitates multi-dimensional, multi-layered approaches and responses. Because it encompasses multiple ministries and departments, it has proven to be difficult for governments to manage. ...
How attackers are using targeted spear phishing to evade cybersecurity defenses’
November 30, 2021Are you one of those organizations that continue to stay nonchalant about Spear Phishing? The level of complacency regarding spear phishing attacks which has seeped into a number of companies ...
Navigating the world of privacy concerns with dApps
October 19, 2021Mobile applications today have become an integral part of daily lives and it has become difficult to manage it without them. From meditation to shopping, there ...
3 elements that form the foundation of ransomware data protection
October 19, 2021Ransomware protection can be overwhelming, especially when it needs to be within budget and rightly so. With the pandemic pushing 89 percent of Indian IT leaders to protect ...
Evolving Security Threats: Protection against the changing cybersecurity risk landscape
October 19, 2021In the past, an organization’s systems were typically secured by perimeter monitoring and the focus of the security teams was on the external elements. However, the remote-working environment has brought ...
How are IT consultancies helping digital payment providers to safeguard their infrastructure from cyberattacks?
September 23, 2021The banking system in India has seen a meteoric rise in the adoption and usage of digital payment systems in the last few years. The government, too, has been urging ...
Data Protection in the Era of the Cloud
September 7, 2021As digital advancements continue to transform today’s landscape into a complex cloud-based space, businesses have become more vulnerable. With the right data protection, businesses can survive data losses caused by ...
5 misconfigurations that make Active Directory a rich target for cybercriminals
July 14, 2021As we delve deeper into high profile cyberattacks such as SolarWinds and Microsoft Exchange, it’s clear that an organization’s Active Directory (AD) is highly sought after by cybercriminals and grossly ...
Collaboration and automation are key to secure organizations in the New Normal
June 25, 2021Soma Tah The COVID-19 pandemic has caused monumental changes in the security outlook for organizations as more and more of their infrastructure becomes distributed across the globe. ...
Advanced cybersecurity strategies for a hybrid world: Securing the post-pandemic workforce
June 18, 2021The coronavirus pandemic has continued to ravage business institutions and social frontiers around the world for the second year running. Though, efforts for supplicating the virulent impact are steadily mounting ...
6 Best Practises that can help safeguard your organisation from data breaches
May 6, 2021Data Breaches a.k.a known as ‘Data robbery’ practice, have become one of the most common technology-related crimes in this increasingly technologically connected world in which unauthorised people access your information ...
10 Tech Trends That Will Redefine Cybersecurity in 2021
February 16, 20212020 has been a year like no other. The pandemic took the world by surprise and has damaged thousands of lives worldwide. From a technology point of view, life has ...
Plea Submitted in the Supreme Court of India Over WhatsApp New Policy
January 18, 2021WhatsApp new privacy policy has been a game changer and not in a good way. From the moment these policy changes were revealed to the public there has been a ...
NortonLifeLock Digital Wellness Report, What We Learned About Cyber Safety in 2020
November 17, 2020The lines between the virtual world and the real world continue to blur in today’s world. The COVID-19 pandemic has forced professionals to work from home. Some of them are ...
The Growing DDoS Landscape
August 14, 2020Last month, news reports highlighted one of the biggest DDoS attacks ever recorded. The attack, which targeted a large European bank, generated 809m packets per second (Mpps). This is a ...
Digital Learning: Updating security levels while negotiating cyber space
July 8, 2020A popular meme doing the rounds on social media highlights how parents in India who used to restrict or ban their children from using computers and smart phones are now ...
COVID 19 – New behaviours and new risks
June 3, 2020What Vladimir Lenin, a Great Russian revolutionary, said, “There are decades where nothing happens, and there are weeks where decades happen”, pretty much sums up the state that we are ...
8 Ways to keep your organization’s data secure during remote work
May 29, 2020In a remote work setting, organizations must add an extra layer of security to prevent unauthorized access to their systems. Training employees and security teams using cyber ranges and having ...
Expert Advice and Tips to Secure Network Infrastructure
May 29, 2020As the world is fighting one of its worst pandemics in a long while, the digital microcosm has seen a rise in cyber attacks that are more sophisticated than before ...