Indian Organizations Face Rise in Cybersecurity Attacks

India Faces Increased Cybersecurity Attacks

( 2 min read ) Several organizations in India, belonging to an eclectic group of industry sectors have recorded an increase in cybersecurity attacks. 32% of the respondents to a survey (the State of Cybersecurity Part 2 from Information Systems Audit and Control Association) indicated that they had experienced a higher number of cyber-attacks than the previous year. Of the […]

Continue reading


5 Security Benefits of Next Gen Firewalls (NGFW)

5 Security Benefits of Next Gen Firewalls

( 3 min read ) An NGFW is a staple part of any security fabric today because it’s built to protect cloud data and network requests. And let’s face it, that’s where a majority of the applications are hosted today. What it means for your business is, even if you consciously don’t dabble in cloud services, there’s a high probability […]

Continue reading


US DoT Impersonation Leads to Massive 2-Day Phishing Scam

US DoT Impersonation

( 4 min read ) As we continue arming ourselves and helping companies arm themselves against modernized cyber threats, cases like these make us realize hackers do still rely on the oldest tricks in the book to pull of their dirty deeds. The United States Department of Transportation was recently targeted for perpetrating a 2-day phishing scam. The DoT impersonation […]

Continue reading


Become a part of NCSAM 2021

NCSAM 2021 - National Cybersecurity Awareness Month

( 2 min read ) Being #CyberResponsible With NCSAM 2021 Every year, October is celebrated as National Cyber Security Awareness Month (NCSAM). This year more than ever, we need this event to be as inclusive as possible. The more strata of organizations do their part in becoming #cyberresponsible, the better chances we have of quelling the huge waves of cyberattacks […]

Continue reading


How Cisco Endpoint Security Offers Enhanced Protection

How Cisco Endpoint Security Offers Enhanced Protection

( 3 min read ) With the introduction to cloud technologies and remote collaboration, there was a pressing need to move away from traditional antivirus and antimalware solutions to something much more efficient and dynamic. Cisco Endpoint Security has always been ahead of the curve, and takes away the prize for having the foresight to integrate their endpoint security mechanisms […]

Continue reading


Security Threats in Banking and How to Handle Them

6 Security Threats in Banking

( 6 min read ) Security threats in banking are becoming much more dangerous. Especially considering how varied and deceptive they have become. Food for thought: In one of the biggest cyberattacks, the data of 3.2 million debit cards used in India was stolen after a malware was injected in a back-end banking system in 2016. The government of India […]

Continue reading


Reasons India Needs Better Cybersecurity in Banking

3 reasons India Needs Better Cybersecurity In Banking

( 3 min read ) Banking in India is a very structured and regulated. Banks realize they’re dealing directly with citizens’ hard-earned money and take it seriously. However, Indian banks were no strangers to the recent digital revolution. The very nature of transactions changed, with internet banking, digital payments, and UPIs. Banks face newer threats. Financial regulators aren’t blind to […]

Continue reading


Effective Endpoint Security

Effective Endpoint Security

( 4 min read ) Endpoint security is a tricky subject, especially considering all the many devices that communicate within and outside a network. Add to that the requirement to connect to data remotely, from not-so-secure personal devices like mobiles and tablets, and the role of effective endpoint security becomes ever more crucial. The attack surface of an organization (comprising […]

Continue reading


Adaptive Cloud Security & Why You Need It

Adaptive Cloud Security

( 4 min read ) Cloud computing brought with it an “always on” world. You can work from anywhere, access your data from anywhere, collaborate with remote teammates and store just about anything up on the cloud. Application servers, email servers, and database servers also shifted to the cloud, allowing for high availability, redundancy, and on-demand access. With these factors […]

Continue reading