Cloud Computing The business Perspective

Summary: The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Learn more about the various risks associated with cloud computing and how to choose the best cloud computing solution for your organization. The Business Perspective The evolution of cloud computing over the […]

Healthcare Debacle

Summary : Security breaches in healthcare are a major issue, but not enough attention is being paid to threats from the inside. A vast majority—92%—of healthcare IT decision-makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49% felt very or extremely vulnerable. Healthcare Debacle : – The insider security […]

BIG hole in Identity Management

Summary : Millions have been invested in securing the periphery, however little or no investment is made in securing the access to the core of any system i.e. Privileged Identities A BIG hole in Identity Management The last decade has seen several debates on Identity Management and the best possible ways to address the growing […]

A Billion Dollar Hack: – How hackers exploited Unprotected Privileged Accounts

Summary: How the Carbanak hacker’s group stole a billion dollars without getting caught and what we learn from it. The financial world and the security industry have been rocked by the recent report from Kaspersky about the cyber-criminals that have stolen more than $1 Billion from global banks through cyber-attacks. The initial reports link the […]

Request A Demo

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.

Become A Partner

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.