This section will cover the latest posts and articles around cybersecurity.

Is our data protected?

Growing cyber attacks

Infamous cybercrimes

“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.

Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.”
― Stephane Nappo

With the ever growing trend of digital information, a lot of new field of study has come into limelight. Some of them include data science, RPA, digital marketing and so on. Data science has presented so many applications that has helped us understand the potentials of what we can do with the data we have. Data can range from the most simple to the most confidential class. Higher the class, the protection and safeguarding becomes an unavoidable aspect

Cybersecurity has undoubtedly been a boon for every organization dealing with data immaterial of the size. Today, in this pandemic era, the dependency on data has been more than ever. With the COVID-19 problem, a lot of things have changed. From people losing jobs, organizations experiencing cyber attack in various forms, the demand for cybersecurity has just skyrocketed and Gartner quotes the rate will multiply by 2022.

As you can see, we’re not short on threats for the coming year. In part, we have new technology to thank for that. As 5G, blockchain and other technologies become more common, they will undoubtedly improve our lives, but also offer significant security challenges.

Whichever industry you’re in, make sure you know how your business could be affected, then plan proactive solutions to keep your business safe.

Source: Yale


Recent breach in government data – critical vulnerabilities still to be fixed

Just a couple of days back, security research team Sakura Samurai had found some critical vulnerabilities. The scrutiny was performed through RVDP also known as Responsible Vulnerability Disclosure Program. The list is believed to be legally provided to the security researcher. One of the members Robert Willis had reported that he was able to gainContinue reading “Recent breach in government data – critical vulnerabilities still to be fixed”

Identity and access management and Internet of Things – An explorative study

Today with the expanding perimeter of the threat landscape and ever increasing digitization of data, the need for cybersecurity is becoming more than important and a factor that can’t be ignored. A lot of these threats are primarily as a result of insider threats and there’s no second thoughts that Identity and access management (IAM)Continue reading “Identity and access management and Internet of Things – An explorative study”

New vulnerabilities being exploited in Solarwinds software – A review

It wasn’t that long, the Solarwinds cyberattack was all over the news, and now there are new vulnerabilities that are being exploited. Researchers from Trustwave have identified three new critical flaws. The vulnerabilities has been addressed to potentially provide access to an attacker leading to compromise the network infrastructure, causing distress to its consumers. SolarwindsContinue reading “New vulnerabilities being exploited in Solarwinds software – A review”

Threat Intelligence in cybersecurity: A key role in incident response

Threat Intelligence is turning into a pervasive ability in numerous security aspects. It is a critical part of security engineering that helps security along with risk management, and specialized experts with the pace of exploding research. It was the time at a point when the dark web and malign activities were detonating, indicating the restrictionsContinue reading “Threat Intelligence in cybersecurity: A key role in incident response”


Something went wrong. Please refresh the page and/or try again.

Keep an eye on this page for more interesting articles

%d bloggers like this: