Security

Enterprise networks

Securing Enterprise Networks by using endpoint security

July 15, 2022

India witnessed the digital revolution a long time ago and is in the process to digitize a large number of things. India's economy is taking full advantage of digitization in ...

cyberattacks

To stop cyberattacks, use the most trusted security networks

April 5, 2022

Cyber security is a multi-domain problem that necessitates multi-dimensional, multi-layered approaches and responses. Because it encompasses multiple ministries and departments, it has proven to be difficult for governments to manage. ...

spear phishing

How attackers are using targeted spear phishing to evade cybersecurity defenses’

November 30, 2021

Are you one of those organizations that continue to stay nonchalant about Spear Phishing? The level of complacency regarding spear phishing attacks which has seeped into a number of companies ...

privacy

Navigating the world of privacy concerns with dApps

October 19, 2021

Mobile applications today have become an integral part of daily lives and it has become difficult to manage it without them. From meditation to shopping, there ...

Ransomware Verizon

3 elements that form the foundation of ransomware data protection

October 19, 2021

Ransomware protection can be overwhelming, especially when it needs to be within budget and rightly so. With the pandemic pushing 89 percent of Indian IT leaders to protect ...

Evolving Security Threats Protection against the changing cybersecurity risk landscape

Evolving Security Threats: Protection against the changing cybersecurity risk landscape

October 19, 2021

In the past, an organization’s systems were typically secured by perimeter monitoring and the focus of the security teams was on the external elements. However, the remote-working environment has brought ...

cyberattacks

How are IT consultancies helping digital payment providers to safeguard their infrastructure from cyberattacks?

September 23, 2021

The banking system in India has seen a meteoric rise in the adoption and usage of digital payment systems in the last few years. The government, too, has been urging ...

Data, Cloud

Data Protection in the Era of the Cloud

September 7, 2021

As digital advancements continue to transform today’s landscape into a complex cloud-based space, businesses have become more vulnerable. With the right data protection, businesses can survive data losses caused by ...

5 misconfigurations that make Active Directory a rich target for cybercriminals

5 misconfigurations that make Active Directory a rich target for cybercriminals

July 14, 2021

As we delve deeper into high profile cyberattacks such as SolarWinds and Microsoft Exchange, it’s clear that an organization’s Active Directory (AD) is highly sought after by cybercriminals and grossly ...

cybersecurity assessments for deltav systems

Collaboration and automation are key to secure organizations in the New Normal

June 25, 2021

Soma Tah The COVID-19 pandemic has caused monumental changes in the security outlook for organizations as more and more of their infrastructure becomes distributed across the globe. ...

cybersecurity

Advanced cybersecurity strategies for a hybrid world: Securing the post-pandemic workforce

June 18, 2021

The coronavirus pandemic has continued to ravage business institutions and social frontiers around the world for the second year running. Though, efforts for supplicating the virulent impact are steadily mounting ...

Data Security Tips

6 Best Practises that can help safeguard your organisation from data breaches

May 6, 2021

Data Breaches a.k.a known as ‘Data robbery’ practice, have become one of the most common technology-related crimes in this increasingly technologically connected world in which unauthorised people access your information ...

10 Tech Trends That Will Redefine Cybersecurity in 2021

10 Tech Trends That Will Redefine Cybersecurity in 2021

February 16, 2021

2020 has been a year like no other. The pandemic took the world by surprise and has damaged thousands of lives worldwide. From a technology point of view, life has ...

WhatsApp_Update_India

Plea Submitted in the Supreme Court of India Over WhatsApp New Policy

January 18, 2021

WhatsApp new privacy policy has been a game changer and not in a good way. From the moment these policy changes were revealed to the public there has been a ...

NortonLifeLock

NortonLifeLock Digital Wellness Report, What We Learned About Cyber Safety in 2020

November 17, 2020

The lines between the virtual world and the real world continue to blur in today’s world. The COVID-19 pandemic has forced professionals to work from home. Some of them are ...

DDoS

The Growing DDoS Landscape

August 14, 2020

Last month, news reports highlighted one of the biggest DDoS attacks ever recorded. The attack, which targeted a large European bank, generated 809m packets per second (Mpps). This is a ...

cybersecurity

Digital Learning: Updating security levels while negotiating cyber space  

July 8, 2020

A popular meme doing the rounds on social media highlights how parents in India who used to restrict or ban their children from using computers and smart phones are now ...

COVID 19 – New behaviours and new risks

COVID 19 – New behaviours and new risks

June 3, 2020

What Vladimir Lenin, a Great Russian revolutionary, said, “There are decades where nothing happens, and there are weeks where decades happen”, pretty much sums up the state that we are ...

8 Ways to keep your organization’s data secure during remote work, Financial Data

8 Ways to keep your organization’s data secure during remote work

May 29, 2020

In a remote work setting, organizations must add an extra layer of security to prevent unauthorized access to their systems. Training employees and security teams using cyber ranges and having ...

Expert advice and Tips to secure Network Infrastructure

Expert Advice and Tips to Secure Network Infrastructure

May 29, 2020

As the world is fighting one of its worst pandemics in a long while, the digital microcosm has seen a rise in cyber attacks that are more sophisticated than before ...