Why Contextual Authentication?

Contextual authentication is gaining more and more prominence in the overall cyber threat and IT frauds prevention landscape.

Contextual authentication is gaining more and more prominence in the overall cyber threat and IT frauds prevention landscape. The risk stemming from IT fraudsters needs attention as the ‘bad actors’ often outsmart ‘good actors’ in the cyber warfare. The bad actors have an uncanny knack to deceive the security controls in place. Although organizations and […]

Privileged Access: Detecting the Blind Spots

Privileged Access: Detecting the Blind Spots - Risks to Watch - ARCON

Managing Privileged Access — is it a simple or complex task? Some readers may say a simple task, while probably many among us would argue that the question itself is vague. Vague in the sense that the privileged access environment is never static. The privileged access environment continuously evolves, so do the complexities associated with […]

Are you monitoring user behavior?

The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from cyber crook hacking a baby monitor to Mark Zuckerberg falling prey to weak password management—a myriad of incidents brought to the forefront […]

Cashless Transactions: Great concept but are we prepared?

On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the circulation. The decision is seen as a major crackdown on rampant corruption, hording, money laundering and fake currency rackets. But more importantly, it points towards […]