Is your organization GDPR compliant?

Is your organization GDPR compliant?

  Febuary 22, 2018 |  compliance, Audit

The compliance landscape with regard to data security is getting more and more stringent. Come May 2018, the General Data Protection Regulation (GDPR) comes into an effect. The regulation would

Addressing the most common pain point for an enterprise

Privileged accounts security: Addressing the most common pain point for an enterprise

  Febuary 16, 2018 |  Corporate Confidential , Data Breach

Organizations , in order to scale up operations and boost efficiency, have been adapting to newer technologies.

Managing Privileged Accounts to fulfill compliance requirements

Managing Privileged Accounts to fulfill compliance requirements

  Febuary 08, 2018 |  Compliance, Policies

The legal framework supporting cyber security is becoming increasingly stringent as modern day enterprises turn more digitized. Indeed, while

Data:  Identifying threats

How Secure is your Data in Managed Service Environment?

  Febuary 02, 2018 |  Business Risk, MSP

Innovation in technology is yielding significant results. Enterprises are gaining efficiency, operational flexibility along with cost reduction as cloud and Managed Service Provider

Data:  Identifying threats

Data: Identifying threats

  November 14, 2017 |  Network Security, User Monitoring

Technology advancement has enabled organizations to gain efficiencies especially with respect to storing and processing data. Since there are multiple resources to store data, its security management is a

Why enterprises need behavior analytics?

Why enterprises need behavior analytics?

  October 25, 2017 |  Network Security, User Monitoring

Modern day organizations face recurrent risks from cyber space. Information systems, as witnessed during the recent wave of advanced ransomware attacks, can be thrown

Revisiting security framework

Revisiting security framework

  October 08, 2017 |  information assets, Cyber incidents

When one of the world’s biggest internet companies reported a series of hacks that compromised confidentiality of hundreds of millions of users, it gave a sober warning to cyber community:

Protecting data in IOT era

Protecting data in IOT era

  September 06, 2017 |  Digital revolution, Vulnerabilities

To add value proposition and boost productivity for business, organizations have been transforming their day-to-day operations by investing more on the internet of things

Is your organization equipped for timely detection?

Is your organization equipped for timely detection?

  August 23, 2017 |  Data breach, Session monitoring

Theft or misuse of critical information assets from compromised insiders, in most cases, occurs as organizations fail to timely detect unusual or

Why it is essential to build resilience around privileged accounts?

Why it is essential to build resilience around privileged accounts?

  August 16, 2017 |  User behavior analytics, Access authorization

Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder,

From emails to admin passwords leaks: rising vulnerability of media companies

From emails to admin passwords leaks: rising vulnerability of media companies

  August 09, 2017 |  Passwords Leaks, Cyber Crooks

Sophisticated cyber-attacks aimed at stealing confidential data and disabling IT systems are not

Protecting privileged accounts … beyond the perimeter security

Protecting privileged accounts … beyond the perimeter security

  July 17, 2017 |  Firewalls, Malware and Ransomware Attacks

Perimeter security is receiving the utmost attention nowadays as advanced cyber threats originating from rogue state

WannaCry attack: Time to shore up data and cyber security

WannaCry attack: Time to shore up data and cyber security

  June 01, 2017 |  Ransomware, Bitcoins, Data loss

The recent ransomware attack dubbed as WannaCry brings to the forefront one of the most recurrent challenges global organizations are confronting today:

Privileged Access Misuse: Four common mistakes firms make

Privileged Access Misuse: Four common mistakes firms make

  April 27, 2017 |  Critical Accounts, Authentication

Any modern-day enterprise’s information systems setup is not static. It grows as business expands. And as business goes through a transition period

Are datacenters fortified to prevent the misuse of shared privileged accounts?

How secured are you against data extrusion threat?

  April 18, 2017 |  BYOD, Data Breach, Identity Thefts

Having at the forefront of information risk management industry for more than a decade now, we have observed that enterprises remain most

Are datacenters fortified to prevent the misuse of shared privileged accounts?

Are datacenters fortified to pevent the misuse of shared privileged accounts?

  February 27, 2017 |  Privileged Login Credentials, Datacenter, Biometrics

Amidst rising threat of cyber crime, enterprises today maintain datacenters

How malicious activities around privileged accounts go undetected?

How malicious activities around privileged accounts go undetected?

  February 17, 2017 |  Privilege Misuse, Database Layers, Identity and Access control

Structuring IT infrastructure in multiple layers of devices and applications brings many

How multiple IT set-up layers compromise privileged accounts?

How multiple IT set-up layers compromise privileged accounts?

  February 14, 2017 |  Root Accounts, Administrative Logins

In this digital age, data is the most valued asset for organizations. What we observe today is a quantum leap forward in the

Are Fintech startups prepared to endure cyber risks?

Are Fintech startups prepared to endure cyber risks?

  February 10, 2017 |  Digital Payment Gateways, Regulatory Compliance

Probably the only startup fad that came any near to match present-day thrill surrounding the Fintech startup scene waswitnessed at the end of last decade

Do you have a security net for Privileged accounts?

Do you have a security net for Privileged Accounts?

  February 03, 2017 |  Privileged Credentials, Insider Threats

Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of

Be mindful of your online footprints

Be mindful of your online footprints

  January 29, 2017 | Browsing pattern, Algorithms, Big Data

Those powerful sets of algorithms coded by search engine and social media giants have made human interaction on internet more purposeful and fruitful. Plan a holiday in  remote foothills

Slack cyber security readiness can bloat insurance policies

Slack cyber security readiness can bloat insurance policies

  January 16, 2017 | Cyber Insurance, DOS

That a failure to prevent cyber-attack can destabilize a business has led global CIOs and CISOs to up the ante against ever looming cybercrime in the

Are you monitoring user behavior?

Are you monitoring user behavior?

  January 10, 2017 | Biometrics, Access Authentication

The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from

Cyber Security Policies.jpg

Cyber Vulnerability: Five Common Mistakes Firms Make

  December 06, 2016 | Data Backup, Phishing, Malware

Notwithstanding big IT security budgets, global organizations are up to a big challenge. Incidents of hacking and data breaches surface far too often, undermining growing cyber

IPhone Vulnerability

Cashless Transactions: Great concept but are we prepared?

  November 29, 2016 | Demonetization, Access Authentication, Mobile Wallets

On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the

Rising cyber thefts underscore banks

Datacenter: Maintain it like a fort

  November 16, 2016 | Datacenter, Sandboxing, Intrusion Detection System

Since prehistoric times, forts have a special significance in our lives. From medieval castles in Scotland to ancients forts built by Greeks, Romans, pre-independence princely

Rising cyber thefts underscore banks

Rising cyber thefts underscore banks’ fragile online defenses

  November 9, 2016 | Computer Systems, Identity & Access Control

Typically, a bank’s customers throng in front of its gates when they fear that their hard-earned money might get disappeared due to financial

Thefts of Digital Assets is Spiraling

Thefts of Digital Assets are Spiraling

  November 6, 2016 | Digital Assets, Privileged Identities

In an increasingly digitized business world,organizations are now measured by their ability to maintain a digital trust among investors, customers, and other

Data Vulnerability

Data Security: Where global organizations err

  November 4, 2016 | Firewall, Data Detection Systems, Secure Configuration

As global firms grapple with increased cybercrimes, compliance managers are paying more heed to cyber security, especially the data.

Organizations now follow a strong IT

Identify Data breach

Is your Firm Prepared to Identify Data breach?

  October 19, 2016 | Identify Thefts, Data Security, Malicious Insider

Data Breach-- one of those excruciating costs which are keeping compliance managers and top managements on tenterhooks--is preventable, if firms possess necessary tools to

Failed M and A Deal

Compromised Digital Security Can Break Business Deals

  October 17, 2016 | Digital Security, Identity & Access Control Management

In an ever-expanding and integrated global economy, firms get assessed by their ability to adapt to changing dynamics in the business landscape.

Investors look

Blockchain Technology

Blockchain Technology: Is it completely foolproof?

  October 13, 2016 | Blockchain Technology, Algorithm Trading

Speed and efficiency are two of the most important cornerstones of the financial industry. To execute transactions at brisk pace while harvesting innumerable amount of data—

Payment Networks

Online Payments: Pluck Those Low-Hanging Fruits

  October 12, 2016 | Payment Networks, Online Banking Apps

Breakthrough in online payments has significantly reduced complexities as a host of payment networks allow us to conveniently transfer payments-- anywhere and anytime.

But one big concern

Telecom Industry

How Telecom Companies can better Manage Risks

  October 02, 2016 | Telecom, Regulators, Compliance

About a year ago, a high-profile hacking incident at the U.K’s leading telecom operator Talk Talk, brought to the forefront many cyber security challenges faced by telecom companies across the

Rio Olympics Athletes Health Data Leaks

WADA Data Breach Lesson: Prioritize IT Spending

  September 30, 2016 | Cyber Assaults, Rio Olympics

Earlier in June, just about a month ago before the Reo Olympics, organizers had one big concern: How to boost cyber-defenses at a time when cybercriminals

Social Media

Small Mistakes can erode Social Media’s Amazing Influence

  September 28, 2016 | Social Media, Data Breach, Passwords

Social Media: who would have thought about a decade ago thata host of websites and applications that allow social networking, will become a core part of our daily life?

Indeed, from

cloud computing

As Firms Switch To Hybrid IT Environment, Data Security Will Need a Closer Look

  September 26, 2016 | Hybrid IT Environment, Data Breach, Privileged Identities

Disruptive technologies such as cloud computing offer many advantages to organizations. As the technology allows to store data in

Secured Data

Have You Secured Those Master Keys to Your IT Network?

  September 15, 2016 | Privileged Access, Data Security, Data Breach

Data breaches continued to haunt corporations across the world. From Japan’s largest travel agency to UK’s leading accounting software firm and from America’s prominent hospital chain to

Fraudulent Money Transfer

This Lurking Threat for Banks from Cyberspace Needs Urgent Response

  September 12, 2016 | Cyber Heist, Financial Institutions, Privileged Accounts

The $ 101 million cyber heist at the Central Bank of Bangladesh, earlier this

IPhone Vulnerability

Cost of a Data Breach: Losing Trust, Reputation & Productivity

  September 07, 2016 | Unauthorized Access, Insider, Identity & Access Control

Malicious insider yet again played a key role behind a data breach.

IPhone Vulnerability

IPhone Vulnerability: What the Incident Taught Us?

  September 06, 2016 | IPhone, iOS, Security Updates

Cyber security is one of the biggest challenges for global organizations. Equipped with advanced tools, cyber criminals are increasingly targeting firms’ IT systems, which in spite of higher

Cyber Vulnerability Compliance

Cyber Security Compliance: Are Compliance Managers and Managements on the Same Page?

  September 02, 2016 | Data Exfiltration, Compliance, Cyber Security, Risk

The topmost risk that today organizations share across all geographies is the threat emanating

Vital Infrastructure

Attacks on Vital Infrastructure: Are Nations Prepared to Avert Catastrophes?

  September 01, 2016 | Critical Infrastructure, Digital War, Cyber Vulnerability

Information technology has significantly transformed the world. Today, it plays a big part in our lives, allowing us to streamline our

Malwares in Your Mobile Phones

These Malwares in Your Mobile Phones Can Drain Bank Accounts

  August 31 2016 | Biometrics, Malicious Software, Access Control

In one of our previous articles in this section, we discussed how financial institutions are grappling with growing incidents of identity thefts and data breaches.

Cyber Espionage

How Much Secured Are You in the Age of Digital War?

  August 29, 2016 | Cyber Espionage, Cyber Security

Rummage into some of the past factual tales of spy agencies then you will realize how the world of espionage is chockfull with intriguing, incredible, but terrifying acts. From the CIA to KGB and from

Drone Security

Ever Thought Drones Could Unleash Cyber Attacks?

  August 25, 2016 | Drones, Cyber Espionage, Data

Protecting highly-classified data has become one of the biggest challenges for organizations across the world, particularly in the

Computerized Mining

Future of Automated Mining: Efficient but at Risk

  August 24, 2016 | Supercomputers, Conveyor Belts, Artificial Intelligence

Necessity is the mother of invention so goes the saying. It could not hold truer for any other industry than the mining business. Hard pressed by a prolonged period of

Cyber Security Policies

Do You Have a Cyber Security Policy in Place?

  August 22, 2016 | Identity Thefts, Secured Configuration, Big Data

Investments on New Technologies is Fine but Risks Mitigation Policy Equally Vital

Hacking of

Password Hacking

Are Your Business Emails Secured?

  August 19, 2016 | Scam-Emails, Cyber-Frauds, Hacking, Secured Configuration, Identity and Access Control, Servers

Fraudsters are now increasingly targeting business emails. According to FBI data, more than 22,000 businesses -- small and

Cyber Attacks

Geopolitical Tensions Can Now Spill Over into Cyberspace

  August 18, 2016 | Cyber Warfare, Denial-of-Service (DOS), Cybersecurity, Malicious Software, South China Sea, Cyberspace

Geopolitical tensions have turned into a one of the biggest sources of cross-border cyber-assaults. Indeed, as nations collide

Cyber Attacks

Identity Thefts a Prime Concern but DOS Attacks Equally Damaging

  August 17, 2016 | Denial-of-Service (DOS), Identity Thefts, Cyber-Heist, Access Control, Secured Configuration

Cyber-frauds such as identity thefts and financial data breaches continued to damage global

Wearable Fitness Devices

Wearable Fitness Devices: Tab on Health but Vulnerable to Hacking

  August 16, 2016 | Wearable Fitness Devices, Database, Data Privacy, Hacking, Risks

Who would have thought about a decade ago that watches and wrist-bands could help us keeping fit and healthy? But then the technology in

Machine Learning Algorithm

Don’t Compromise on Security for Convenience

  August 10, 2016 | Identity Thefts, IT Security, Hacking, Bitcoin, Passwords Keys, Cyber Attacks, Cyber Frauds 

Recent hacking at the Bitfinex Exchange raise questions over how we manage our vital

Machine Learning Algorithm

Trading Algorithms: Fast and Cost Effective but Extremely Vulnerable

  August 09, 2016 | Algorithms, Hacking, Vulnerability, Malicious Insiders,  Artificial Intelligence

Trading algorithms or “algos”, the highly advanced, automated, but complex tools, allow modern-day asset

Big Data

Poor Cybercrime Prosecution Rate Can Stifle IT Growth

  August 08, 2016 | Cybercrime, Prosecution Rate, Identity Thefts, Financial Data Breach, Cybersecurity Regulations, Access Control

As businesses across the world grapple with growing incidents of identity thefts, financial data

Big Data

The Quagmire of ‘Big Data’

  August 05, 2016 | Data, Big Data, Identity Thefts, Insiders, Data Security, Malicious Insiders

Gaining competitive advantage over business rivals remains as the topmost concern for any business. To do this, organizations ceaselessly work to improve all business

Unmanned Automated Fighter Planes

Why Risks Loom Over Despite Deploying Security Measures

  August 04, 2016 | Security, Sandboxing, Encryption, Firewall, Insider Threat, Cyberspace, Data

Organizations usually have a tendency to safeguard IT systems against external vulnerabilities but often insider threats are

Unmanned Automated Fighter Planes

Will Unmanned Automated Fighter Planes be Vulnerable?

August 02, 2016 | Avionics, Unmanned Automated Fighter Planes, Algorithm

Avionics engineering has evolved a long way. From presumably the first-ever German fighter plane  Messerschmitt Me 262,

Pokemon Go

Your Favorite Smartphone Game Downloads are Not Safe

July 29, 2016 | Augmented Reality, Personal Data, Security

Augmented reality (AR) smartphone game, Pokémon Go, got launched in several markets few days ago. The game turned out as an instant hit everywhere. The number of downloads of Pokémon Go

Aviation Industry

Compromised Privileged Identities can ‘Land’ Airline Companies in Trouble

July 27, 2016 | Privileged Identities, Cyber Security, Cyber Threats

Ever-expanding cyberspace amid increasing digitization of businesses boosted global trade, commerce, and innovation; risks and

US elections

Increasing Cyber-Threats to Drug-Makers

July 26, 2016 | Cyber-Threats, Risks, Data Breach, Cyber Security

No other industry is more vulnerable to risks and uncertainties than drug-makers. It takes years for drug-makers to develop a new treatment. These companies

US elections

U.S. Presidential Elections: What Email Leaks Point to?

July 25, 2016 | Hacktivists, Privileged Accounts, Data Leaks, Vulnerable Access

A spate of email leaks during a run-up to the US Presidential elections has left Democrats hiding for a cover; but it also shows how


ASEAN Integration: Governments Should Pay More Heed to Cyber Security Regulations

July 21, 2016 | Cyber Security, Regulation, ASEAN

Britain’s decision to leave the European Union (EU) last month left many dumbfounded. It rattled markets; and, unnerved the global market sentiment. That

Artificial Intelligence

Artificial Intelligence: Incredible Possibilities but Devastating Risks

July 20, 2016 | Artificial Intelligence, Risks, Security

Our experience of Artificial Intelligence (AI), in general, is limited to Hollywood movies, wherein robots working on AI performs

Password Management

Data Breach: Adapting to Biometrics is Only the Half Job Done

July 18, 2016 | Biometric Access, Identity Theft, Privileged Identity/Access Management

Identity theft remains one of the biggest concerns for banking institutions across the world. The number of data breach

Secured Financial Transactions

SWIFT’s Decision to Hire Cybersecurity Firms is Step in a Right Direction; but Banks Need to Do More

July 15, 2016 | Privileged Identities, IT Security, Privileged Access Management, Security Breach

Earlier this week, the world’s biggest

Perils of 3D Printing Technology

Perils of 3D Printing Technology

July 13, 2016 | 3D Printing, Computer Assisted Design

Cost, quality, and efficiency, these are the key metrics that any organization--be it a manufacturing company, financial institution or a service agency-- strives to improve, relentlessly. A sound

Increasing Digitalized African Economy Need a Closer Look at IT Security

Increasing Digitalized African Economy Need a Closer Look at IT Security

July 12, 2016 | Privileged Access Management, Identity-Theft, Intellectual Property

The African economy has been through an amazing


Autonomous Vehicles: Have Manufacturers Addressed All Safety Concerns?

July 11, 2016 | Autonomous Vehicles, Hacking

Probably the two most talked about topics in the world of emerging technology are autonomous vehicles and the internet of things. Amid its ever


Data Breach: Stolen Sensitive Data is a New Commodity

   July 05, 2016   |   Data Breach, Privilege Misuse

As cybercriminals turn more technology savvy, possessing necessary tools and competence to breach your IT security systems, businesses across the world, are facing a grave challenge, which is to


The Internet of Things: Puts You at Ease but with Risks

   July 04, 2016   |   Internet of Things, Denial-of-Services

Disruptive technologies such as cloud computing, and the internet of things have made our lives at ease, efficient, exciting, and


Will the Recent Unfolding of Events in the EU Impact Indian Software Firms?

   July 01, 2016   |    Business Uncertainty, Software

As the dust settles down after a mayhem sparked off by the shocking referendum outcome in Britain, we look at


Will China Enforce Tougher Cyber security Laws?

   June 30, 2016   |   Cybersecurity Regulations, Cyberspace, GRC, User Data

China, the world’s second largest economy, and home to some globally renowned technology companies,


Rio Olympics: Threats from “Hacktivists” and Organized Cybercriminals

   June 29, 2016   |   Cyber-defenses, Cloud, Cyberattacks, Hacktivists

However, one of the most daunting tasks for organizers nowadays is to ensure cyber-defenses is up to the mark.  

Come August 5,


Insider Threats to Critical IT Assets is on the Rise

   July 05, 2016   |   Privileged Access Management, Insider Threat, Data-Breach

Data-breach incidents nowadays have not just become far too rampant but the losses arising out of those attacks


How Britain’s Decision to Leave the EU can Affect Cybersecurity Market

   June 27, 2016   |   Cyber Security, Risk, Cyber Threats

As Britain faces a glaring reality of its disintegrating influence in the global arena following a shocking poll outcome which saw a majority of


Japan Looks to Fortify IT Systems as it Prepares for Possible Cyberattacks in Olympics 2020

   June 27, 2016   |   IT Systems, Cyber Attacks, Privileged Access Management

There was a time when Japan was relatively immune to cyberattacks. Indeed, in 2013, Asia’s second largest


Brexit Rattles Global Markets, Impending Uncertainties and Risks for Britain and the EU

   June 24, 2016   |   Brexit, Cyber Attacks, Global Markets



Regulators Warn Bitcoin can ‘Potentially Create Financial Stability Risk’

   June 22, 2016   |   Risk, Bitcoin, Cyber Crime

Bitcoin, a cyber-currency, has received some flak from the influential circles in the US amidst its growing popularity.

US regulators,


Possible Risks in Case of a #Brexit

   June 22, 2016   |   #Brexit, Risk, IT assets,IT security

Ahead of the crucial referendum on #Brexit, which will be held on Thursday June 23rd, Britain, including global market participants, remain edgy.

There is a growing curiosity over


Product In Action

Follow us


Keep in Touch

   This email address is being protected from spambots. You need JavaScript enabled to view it.
+91 22 4221 5300  (INDIA)  
+97143633637 / +971507080970  (MIDDLE EAST)  
  (212)-537-6519   (USA)  
  +61- (02)8006-1236   (Australia)  

   Get Directions