Privacy and security challenges with Internet of Things in 2021 – A review

Data protection and security have been a major concern with respect to data in any form. The issues and challenges have been developing at a rapid pace. Even though quite of lot of issues have been addressed with growing technology, there still exists some challenges that are being encountered by the Internet of Things (IoT).Continue reading “Privacy and security challenges with Internet of Things in 2021 – A review”

Cybersecurity Trends – What to Expect in 2021 – 2nd Innings

From merely being used as terms such as ‘computer security’, ‘digital security’; evolving into the term cybersecurity, there has been a phenomenal progress in these past few years. With predictions like a cyberattack is occurring every 5 seconds somewhere across the world, its becoming paramount to implement cybersecurity as a part of the critical infrastructureContinue reading “Cybersecurity Trends – What to Expect in 2021 – 2nd Innings”

Cyber Threat intelligence – Current trends, market prediction- A significantly undermined factor

Amongst all the cyberattacks and ransomware attacks, industries that have been employing digital technologies have been rattled with the recent supply chain outbreak. The mechanization and more prominent connectedness that have managed to upset the world’s financial and social foundations — however they’ve likewise gotten hazard the type of cyberattacks. Threat Intelligence is information thatContinue reading “Cyber Threat intelligence – Current trends, market prediction- A significantly undermined factor”

Kaseya supply chain attack – REvil ransomware –History witnesses a new generation RaaS

Even though there have been quite a few breaches in this year already, this attack has definitely made eyes turn back. An enormous series of events on Friday infested at least hundreds and likely thousands of businesses globally with ransomware, including a railroad chain, pharmacies and hundreds of Swedish co-op supermarket brand stores. a turningContinue reading “Kaseya supply chain attack – REvil ransomware –History witnesses a new generation RaaS”

SolarWinds breach hackers on the row – This time its Microsoft! Enter Nobelium!

In the recent past, the famous company SolarWinds had encountered a couple of attacks and new vulnerabilities being taken advantage of. This time, the hackers who breached SolarWinds seem to have infiltrated some of the Microsoft infrastructure. Its reported that the customer support tools have been compromised. As another sign that Russian hackers who attackedContinue reading “SolarWinds breach hackers on the row – This time its Microsoft! Enter Nobelium!”

The ever-increasing demand for Cybersecurity – Better late than never

Its thought-provoking that I was going through some interesting articles about the projected growth of cybersecurity as we are inching closer to the world of cyber-crimes in this 21st century. The world has shifted to a digital-centric model, with many operations currently remote, distanced, and online. The pandemic was a large catalyst for this, asContinue reading “The ever-increasing demand for Cybersecurity – Better late than never”

Brainjacking, the movie in the making : Cybersecurity for BCIs

Brain Computer Interfaces (BCIs) have essentially grabbed quite a lot of attention amongst researchers today. From merely being a product that could record EEG, today BCIs have been used for multiple reasons including treatment of motor impairments, neurorehabilitation and severe nerve-related problems. BCI improves the ability of the human brain to interact with its environment.Continue reading “Brainjacking, the movie in the making : Cybersecurity for BCIs”

IdaaS in the cloud and IAM market growth – The first line of defence

The current situation has forced quite a lot of sectors to move their resources and infrastructure to the cloud environment. Irrelevant of on-premises or cloud environment, Identity and Access management is undoubtedly of immense importance in the cybersecurity space. The global customer identity and access management software market focuses on performing core statistical tests ofContinue reading “IdaaS in the cloud and IAM market growth – The first line of defence”

Another one bites the dust – Fujitsu to Fujifilm to JBS – To destination unknown – Who’s next

It wasn’t that long ago, the famous Japanese company Fujitsu got hit by a cyber attack. A week ago, it was reported that “threat actors have stolen files from several official government agencies of Japan by hacking into Fujitsu’s software-as-a-service (SaaS) platform and gaining access to its systems”. The attack proved to be detrimental thatContinue reading “Another one bites the dust – Fujitsu to Fujifilm to JBS – To destination unknown – Who’s next”

Governance, Risk and Compliance – Trends & News – une analyse

GRC or Governance, risk and compliance has always been a significant benchmark for a lot of organizations to operate efficiently and manage the ever-growing threat landscape. Many bodies like NIST, ISO and other leading bodies have been releasing a lot of frameworks and standards since time immemorial. With various cyber attacks growing swiftly, the needContinue reading “Governance, Risk and Compliance – Trends & News – une analyse”