The incident that reraised the question of ‘Trust’ Remember the infamous bank heist in 2016 that targeted one of the central banks in South Asia? We are not sure if we have learned any lessons from that incident. Recently, cyber crooks performed a similar replay of the incident at a cooperative bank in northern India. […]
In one of our earlier Risks To Watch articles, we discussed how organizations face the risk of not accepting adequate and relevant security measures on time due to resistance from the end-users. On a similar subject, Amazon Web Services (AWS) recently expressed its views. The study highlights how the lack of cloud policy and the necessary skill set restrict organizations from adopting advanced and comprehensive cloud services.
According to this research, almost 63% of the employees in any organization feel the requirement for training in cloud-related skills to either serve the employer or progress in their own careers.
Closing the stable door after the horse has bolted Securing data assets from compromised elements is one of the most challenging tasks for IT security professionals. A growing number of data breaches is a testimony to the fact that malefactors can very easily target vulnerable gaps in IT infrastructure. And this challenge is further aggravated […]
About Edge Computing Real-time insights are the driving force behind the adoption of artificial intelligence (AI). That’s why edge computing, an extension of cloud computing, is being increasingly adopted by enterprises that have to navigate a large number of use cases for their mission-critical scenarios. As the term suggests, edge computing provides the “edge” in […]
Passwords are ubiquitous. In any digital ecosystem, passwords are the predominant authentication credentials to login to systems. As a result, password credentials are one of the most vulnerable forms of IT assets. Passwords are often the soft target for compromised corporate insiders and organized cyber criminals. Against this backdrop, passwordless authentication is gaining prominence among […]
The Context Young students at high schools, colleges, and universities are internet savvy, passionate about digitalization, and very particular about their online presence. The post-pandemic age has had a big impact on the lives and lifestyles of students. They got entangled with several advanced technologies while attending online classes during the pandemic, and the trend […]
The Context Organizations are investing in new technologies vehemently to stay competitive. Cybersecurity is among the top priorities. And the adoption of the latest cybersecurity measures has increased significantly in recent years due to emerging IT use cases, resulting in the rapid adoption of cloud technologies. Subsequently, implementing an Identity Threat Detection and Response mechanism […]
ARCON has always propagated the message of controlling and protecting the inner realm of an organization’s IT network. It builds the foundation for robust cybersecurity. Whether the cyber-criminal sits outside the realm or is present inside the periphery, typically it is the compromised insider-privy to confidential information- who is behind an insider attack or cyber-espionage. […]
Overview It is not uncommon that critical systems are often targeted by cyber criminals. And we have documented it from time to time. But this time the attack was on toll collection systems. Indeed, gone are those days when you take out your wallet to pay highway tolls while driving through the city suburbs. Today […]
Overview A recent report by The Economic Times (CISO) revealed that more than 600 twitter accounts, emails and websites pertaining to the government of India were compromised in the last five years. CERT-In, the official government body that notifies the affected entities along with remedies, have also confirmed these shocking statistics. The ‘Digital India’ drive, […]