Current Activity

How to Secure Critical Infrastructure When Patching Isn’t Possible

Cyberattacks are on the rise and threatening our digital life and our most intimate information — but also our operational realities. Read More

Download: CISO Checklist for Secure Remote Working

The recent mass transition to working remotely coupled with cyberattacks introduces a heavy burden on the CISO. The CISO Checklist for Secure Remote Working provides a concise, high-level list of the absolute essentials needed to ensure their organization is well protected in these challenging times.

Security Technology: A recommended list of product categories that should be installed and configured. Read More

TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guysc`

For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots takes you back to the first version of the Secure Sockets Layer (SSL) protocol, which was developed in 1995 by Netscape but never released due to it being riddled with security vulnerabilities. SSL 2.0 and 3.0 quickly followed and were released but also had their issues.

Read More

45% of Indians Do Not Back Up Their Data & Files Says Avast Survey

According to an Avast survey, nearly 45% of Indians do not back up because they don’t think their data or files are important enough and in turn risk of data loss increases.

Avast conducted an online survey before World Backup Day to raise awareness around the importance of securing data. Read More

Human-layer’ is the Weakest in Cybersecurity & Responsible for Major Cyber Breaches : Venture Beat

Although Cyber security investment and budgets are going up but there are also sharp increment in cyber breaches across the world and organizations are still struggling to cope up with it.

From breached buyer and consumer information to phishing assaults that result in compromised methods or direct twine fraud, human-layer problems are the number-one purpose of information breaches.

Actually, 88% of information breaches reported to the United Kingdom’s data commissioner’s place of work have been led to through human components. Humans are the weakest link and human layer assaults have an effect on corporations each financially and from a reputation viewpoint. Read More

Distributed disruption: Coronavirus multiplies the risk of severe cyberattacks

The coronavirus pandemic is upending everything we know. As the tally of infected people grows by the hour, global healthcare, economic, political, and social systems are bending and breaking under the strain, and for much of the world there’s no end in sight. But amid this massive wave of disruption, one thing hasn’t changed: the eagerness of cybercriminals to capitalize on society’s misfortune and uncertainty to sabotage, cripple, mislead and steal.

Read More