Potent & Wider Attacks
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
Defeating old age is not exactly a new concept, even our oldest work of literature in the world i.e. the epics of Gilgamesh deals with search for immortality. The only… Read more »
The World Wide Web is replete with news stories and analyst reports of data leakage and theft ostensibly by ‘trusted’ employees leading to irreparable loss of brand trust and the inevitable lawsuit and resultant fines. How do you secure your precious data against such loss? Here are four steps that every data security practitioner needs to be aware of.
Narrating fictional scenarios may set the pertinent context for deliberations on ‘The Future of Crime’. Popular movie ‘Minority Report’ directed by Steven Spielberg builds around the premise; if criminals can… Read more »
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices, mature enough,… Read more »
Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday… Read more »