Tag "Cyber Security"

Making Zero Trust security a frictionless experience for the users

by May 2, 2022

There is a classic contrast in security. Organizations must make data and services available to the public, but a data breach can occur if they are too publicly accessible or …

Read More [shareaholic app="share_buttons" id="15671367"]

Log4j vulnerability: A major disaster that the tech industry faced

by March 31, 2022

A serious cyber risk vulnerability was found in an open-source Apache Foundation which compromised the IT landscape, creating a meltdown in the tech world. Log4j is a logging utility …

Read More [shareaholic app="share_buttons" id="15671367"]

Security risks that lurk deep inside the Metaverse

by March 30, 2022

Soma Tah & Ashok Pandey   As the world of metaverse is still unfolding before us in layers, we don’t know about the potential risks or security loopholes …

Read More [shareaholic app="share_buttons" id="15671367"]

Tips to create a secure ‘Work from Home’ culture and practices

by March 15, 2022

Soma Tah & Ashok Pandey   The future of work is remote and hybrid and there is no way organizations can afford to ignore …

Read More [shareaholic app="share_buttons" id="15671367"]

Malicious actors on the prowl; Don’t let your guard down, ever!

by March 15, 2022

Soma Tah & Ashok Pandey    The enterprise attack surface has grown exponentially during the New Normal of Work. Remote work, virtual meetings along with digitalization …

Read More [shareaholic app="share_buttons" id="15671367"]

How suppliers can mitigate the growing supply chain risks with proactive defense

by December 21, 2021

Supply chain attacks are predicted to quadruple in 2021 and unfortunately, various forms of cyber-attacks have become the norm across nearly every industry. Cybersecurity Ventures has predicted that, by …

Read More [shareaholic app="share_buttons" id="15671367"]

Cyber Security Awareness Month: 40% Increase in Weekly Cyber Attacks on Organizations Worldwide in 2021

by October 6, 2021

As October Cybersecurity Awareness month embarks, Check Point Research shares new data on current cybersecurity threats by volume, industry and region. Cyberattacks on organizations worldwide surged 40% in 2021, compared …

Read More [shareaholic app="share_buttons" id="15671367"]

How this Indian IT company is helping the US retirement plan industry pivot to the cloud

by September 13, 2021

Soma Tah   Rising fee structures and healthcare costs along with an ageing population have intensified pressures on the US retirement plan industry ecosystem in the last …

Read More [shareaholic app="share_buttons" id="15671367"]

Collaboration and automation are key to secure organizations in the New Normal

by June 25, 2021

Soma Tah The COVID-19 pandemic has caused monumental changes in the security outlook for organizations as more and more of their infrastructure becomes distributed across the globe. …

Read More [shareaholic app="share_buttons" id="15671367"]

6 Best Practises that can help safeguard your organisation from data breaches

by May 6, 2021

Data Breaches a.k.a known as ‘Data robbery’ practice, have become one of the most common technology-related crimes in this increasingly technologically connected world in which unauthorised people access your information …

Read More [shareaholic app="share_buttons" id="15671367"]

Cloud: A silver lining for businesses amidst pandemic

by August 17, 2020

Soma Tah   Indian businesses have started leveraging Cloud technologies to a great extent as they attempted to cope with these uncertain times, ensure business continuity, and power …

Read More [shareaholic app="share_buttons" id="15671367"]

Secure Video Conferencing: Beware, even if no one’s ‘officially’ recording the meetings

by April 21, 2020

Soma Tah   The demand fort team collaboration and video conferencing tools for both personal and business interactions have skyrocketed during the ongoing Coronavirus crisis. Faced with the unprecedented challenge of maintaining social distancing, …

Read More [shareaholic app="share_buttons" id="15671367"]

Secure Video Conferencing: Define roles to avoid video calls hijacking, data theft

by April 21, 2020

Soma Tah   The Coronavirus crisis has brought in significant changes to life and work. Organizations embraced ‘remote work’ culture to ensure business continuity during stringent countrywide lockdown measures. The demand fort team …

Read More [shareaholic app="share_buttons" id="15671367"]

5 cyber safety tips for women

by March 8, 2019

There is less doubt that women are more social, expressive and vocal as compared to men and what better means to enjoy such freedom of expression than the social media. …

Read More [shareaholic app="share_buttons" id="15671367"]

CyberArk: The CISO View on DevOps: New Report Highlights Approaches to Reduce Cyber Security Risk

by January 28, 2019

CyberArk issued a new research report, “The CISO View: Protecting Privileged Access in DevOps and Cloud Environments.” Based on the direct experiences of a panel of Global 1000 …

Read More [shareaholic app="share_buttons" id="15671367"]

37% of Organizations Impacted by Cryptomining over Past Year, shows Check Point’s 2019 Security Report

by January 25, 2019

 Check Point Software Technologies Ltd. has published the first instalment of its 2019 Security Report.  The Report highlights the main tactics cyber-criminals are using to attack organizations worldwide …

Read More [shareaholic app="share_buttons" id="15671367"]

Check Point Introduces Maestro

by January 23, 2019

 Check Point Software Technologies Ltd. has today introduced Check Point Maestro, the industry’s first truly hyperscale network security solution.  Check Point Maestro is a revolutionary new architecture that enables …

Read More [shareaholic app="share_buttons" id="15671367"]

The Confidence That Our Existing Customers Show Being References For Our Credibility, Gagandeep Singh, AUJAS

by December 18, 2018

In conversation with PCQuest, Gagandeep Singh, VP, Managed Threat Detection and Response, AUJAS speaks on the solutions they offer on cyber security. How is Aujas different from other players? Aujas is an …

Read More [shareaholic app="share_buttons" id="15671367"]

F-Secure boosts endpoint detection and response with unique on-demand elevate to experts

by November 20, 2018

F-Secure Rapid Detection & Response back up companies fighting intruders and helps overstretched cyber security personnel stop breaches automatically before they happen in one easy to use solution.

Read More [shareaholic app="share_buttons" id="15671367"]

AI is Changing the Landscape of Cybersecurity

by November 5, 2018

It’s no surprise that artificial intelligence (AI) is one of the most searched technological terms in Google; however, ironically this function itself is also executed by AI. This emerging …

Read More [shareaholic app="share_buttons" id="15671367"]