How to avoid Equifax breach with regular Vulnerability Assessments ?

equifax

Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, via Equifax breach, made off with highly sensitive personal information including social security and credit card numbers of about 143 million users. However, one interesting information has surfaced that Equifax knew about the breach much […]

Continue reading


Why SMBs are the best target for latest cyber attacks?

SMBs are the best target for cyber attack

Small and medium scale businesses (SMBs) of all streaks are at higher risk to latest cyber attacks compared to large business enterprises. All types of small businesses (teaching institutions, ecommerce shops, hotels or retailers) have become the favourite target of cyber thieves in the past couple of years. Cyber criminals find it easier to hack […]

Continue reading


CIO strategies for preventing new security breaches

CIO strategies

Digital transformation has ensured that cybersecurity is the biggest concern facing CIOs. As we proceed further in the 4th industrial revolution the technology is going be evolve much faster than companies could keep pace with. Cybersecurity isturning into a major priority for business leaders, but to succeed CIOs must prepare themselves for the developing threats […]

Continue reading


Strategic risks of a cyber-attack in 2017!

Strategic risks of a cyber attack

Open and digitally inter-connected technology platforms are shaping future of businesses. As the migration to digital platforms happen, hackers get more ground to target for financial gains via multiple mediums such as ransom, sensitive information exposures, corporate espionage, identity theft etc. One of the latest example of extortion from a corporate is HBO corporations. After […]

Continue reading


Which is the most apt vaccine for 2017 epidemic: Cyber-Attacks?

cyber-attacks

With Internet, digitization, automation transformation taking center stage, cybersecurity turns up as one of the biggest concern. Email remains the biggest threat vector for cyber-attacks – claims a recent survey by Barracuda. Already multiple threats or comprises have been the part of cloud computing, IoT, mobile activities. Organizations need to look at the landscape to […]

Continue reading


Use your own Data wisely to detect an attack!

data

Perennial, for a problem to exist that cyber-criminals areahead of security measures deployed. Your own data can be used effectively to hit the achilleas heel of the attacker.  Since the sophistication grows with time so must the traditional methods of security. Threat detection systems based on signatures, file checksums or blacklisted URLs are all passé. […]

Continue reading


Cyber threats may wreak Havoc by 2020

2020

India will face increasingly sophisticated “destructive” cyber threats as compared to the current scenario which is adding up to 200 million, malware related and 1,90,000 unique, intrusion related attacks in any given week. Gulshan Rai Indian cyber security chief briefed the Parliament’s finance standing committee that the cyber-attacks of nuisance and viruses of 2000’s have […]

Continue reading


Increase Threat Hunting beyond ATP Tools

atp

ATP tools are the core of most of the cyber-crime fighting software’s. Today, we have a generation of products from vendors promising state-of-art detection using machine learning, neural networks, and threat intelligence. With all the promises of safe keeping and the demo where the installed system detects and blocks the malicious stuff- we still have […]

Continue reading