This Massive Information Breach should be an Eye-Opener

This Massive Information Breach should be an Eye-Opener

July 12, 2019 |  Data Breach,  Privileged Identities

The National Aeronautics and Space Administration (NASA) must have been embarrassed to be in the news of being a victim of data breach. However, the fact is, this “unexpected” incident has reminded the cyber world

Half-baked Measures to control Privileged Access can Jeopardize IT Infra

Half-baked Measures to control Privileged Access can Jeopardize IT Infra

July 05, 2019 |  Privileged Accounts,  SSO

ARCON recently came across a very interesting use case. Our pre-sales team was asked by one of the leading manufacturing organizations to provide a demo to understand the benefits of ARCON

Track Privileged Accounts to Avoid Catastrophe

Track Privileged Accounts to Avoid Catastrophe

June 07, 2019 |  Cloud Computing,  Auto-discovery

The advancement in information technology has brought forth boon on one hand and bane on the other. While technology advancements like cloud computing and big data have created IT operational efficiencies, a large pool of data created out

Is your organization controlling access to critical systems?

Is your organization controlling access to critical systems?

May 24, 2019 |  Granular,  Access Control

In the wake of numerous incidents involving abuse of privileged credentials and data breach, organizations are looking for more robust technology that could monitor privileged user activities in real-time and at

Reinforcing Information Security - Need of the hour in Africa

Reinforcing Information Security - Need of the hour in Africa

May 10, 2019 |  IT security,  Data Breach

Threat Landscape

One of the major news channels of South Africa suffered massive data

How robust is your Password Management?

How robust is your Password Management?

April 26, 2019 |  Password,  User Data

Do we ever forget or share security numbers of our safety lockers in banks where we keep our precious and valuable items for security? Or do we ever share ATM pins or internet banking credentials with anyone? Then why can’t we keep the same habit

IOTs: Serious cyber risks but we can secure those

IOTs: Serious cyber risks but we can secure those

Feb 22, 2019 |  IOT,  Cyber Defense

IoT (Internet of Things) has made our lives comfortable, easy, smart, exciting and it has spurred innovation too. The boom of IoT in the recent past is expected to have a huge amount of monetary involvement that can

Protecting health information: Time to be proactive not reactive

Protecting health information: Time to be proactive not reactive

Feb 08, 2019 |  GDPR,  HIPPA

More than a week back, Singapore National Public Health Authority revealed that almost 14,000 health records of people from Singapore and other foreign nationals were compromised and leaked online.

“I'm sorry

The Importance of Privileged Access Management knows no bounds

The Importance of Privileged Access Management knows no bounds

Feb 01, 2019 |  Access Management,  Data Security

A young man named Sumit joined an organization as a junior sales associate. The company allotted him a laptop for his daily work activities. Sumit found that the laptop was used by the

Privileged Access Management: A Remedy for Data Security

Privileged Access Management: A Remedy for Data Security

Dec 24, 2018 |  Digital Identities,  Insider Threats

There was a recent data breach incident in one of the global E-commerce giants. Immediately after the news turned epidemic, the management dished out the queries and criticism and

Secure Passwords, Save your Digital Assets

Secure Passwords, Save your Digital Assets

Dec 14, 2018 |  Password Vault,  Digital Data

Who can forget the infamous data breach incident of one of the popular file hosting service providers where more than 60 million users’ email addresses and passwords got affected? An employee just reused a password at work and

Role of PAM in meeting Regulatory Compliance

Role of PAM in meeting Regulatory Compliance

Dec 03, 2018 |  Password Management ,  Password Vault

Facebook could face penalties worth in billions under GDPR (General Data Protection Act) compliance act for not following the basic policies. It happened because more than 50 million accounts were compromised due to

Healthcare Industry: Time to reinforce privileged access control

How to mitigate misuse of Privileged Accounts

  Nov 16, 2018 |  Password Management ,  Password Vault

Misuse of privileged accounts is one of the burning threats for enterprises today. The detection process is time-consuming. Even if the organizations try to calculate the amount of loss

Healthcare Industry: Time to reinforce privileged access control

Healthcare Industry: Time to reinforce privileged access control

  Oct 24, 2018 |  Healthcare ,  Authentication

IT security awareness has become a crying need for the CIOs, CISOs and CTOs of global enterprises. After BFSI, Government, Manufacturing, IT and Pharmaceuticals industry, now Healthcare industry

Proper Password Management: A big concern till today

Proper Password Management: A big concern till today

  Oct 9, 2018 |  Privileged accounts , Password Policy

A recent audit on Western Australian Government has revealed that almost 1500 employees are using same password for more than six thousand five hundred accounts. From the point of view of data security, this news has

Alarming Rise of Privileged Account Breaches

Alarming Rise of Privileged Account Breaches

  Sep 19, 2018 |  Cyber Security , Malicious Activitied

Digital security breaches happening globally have not spared any industry from its fangs. These breach incidents mostly take place with the help of external malefactors or malicious insiders. The ever-existing

Data Breach Prevention

Data Breach Prevention: Focus of Modern Business Entrepreneurs

  Aug 24, 2018 |  Digital Threats , Access Management

It has become quite rare today that we are not coming across any news of data breach incident irrespective of small or large organizations. This has forced the new and young entrepreneurs to take adequate preventive measures rather than paying

University Students’ Data are at stake

University Students’ Data are at stake

  Aug 20, 2018 |  Privileged Accounts , Authentication

It is definitely unruly and obnoxious to learn that the cyber crooks are not sparing education sector from their target zone. Few months back, some unethical hackers (suspected to be from Iran) made an alleged spree of malicious attacks

Unmonitored Privileged Accounts

Combat the Challenges of Unmonitored Privileged Accounts

  July 31, 2018 |  Malicious insiders , Users credentials

Some recent alarming statistics about Privileged Access Management (PAM) yells out the danger that

Is your enterprise security compliant?

Data Theft: Still a Major Concern

  July 19, 2018 |  User Credentials , Sensitive Data

As more than one hundred Government websites were compromised between April 2017 to January 2018, another hair-raising incident of Provident Fund portal hack in April 2018, has put the data of 2.7 crore people at stake. With this, the revolutionary

Is your enterprise security compliant?

Is your enterprise security compliant?

  July 12, 2018 |  Compliance, Data Policy

With mandatory GDPR (General Data Protection Regulation) and PCI DSS (Payment Card Industry Data Security Standard) compliances already making its way to protect the personal data and digital assets of late, any kind of non-compliance could cost

Malicious Insider: Tame your Worry

Malicious Insider: Tame your Worry

  July 05, 2018 |  Insider threats, Data Security

Historically and traditionally, outsiders pose bigger threats to organizations as far as data security is concerned. However, of late, it has been a subject of debate where many security professionals are of the opinion that insiders pose bigger threats to modern

Identity and Access Control: Must for Digitization

Identity and Access Control: Must for Digitization

  June 25, 2018 |  BYOD, Passwords, Identity Breaches

The global digital workspace is expanding at rapid pace and by 2020 most of the organizations would take the path of digitization worldwide. Simultaneously, types of security breaches are getting

The awakening of IT security boom in Africa

Is your fitness app secure?

  June 20, 2018 |  Authetication, Lifestyle, Identities

While Oliver was jogging down the track and took a halt to adjust his snickers, little did he knew that the fitness app he installed in his smartphone to monitor his heartbeat is being accessed by some malefactor unlawfully. This has happened to

The awakening of IT security boom in Africa

The awakening of IT security boom in Africa

  June 13, 2018 |  IOT, Access Control, Cyber Incidents

The abundance of cloud computing, Artificial Intelligence (AI) and Internet of Things (IoT)are driving massive growth in IT opportunities in Africa off late. The IT sector in South Africa is expected to reach R175 billion by

Email-Compromise-Scam-hits-hard-in-Aussie real-estate

Email Compromise Scam hits hard in Aussie real estate

  June 11, 2018 |  real estate sector, User Data

During the end of 2017 in Australia, cybercriminals started to target the real estate sector which is considered as a comparatively weak industry in terms of IT security.

According to a

Smart City: Are we secured?

Smart City: Are we secured?

  June 06, 2018 |  digital security, Artificial Intelligence

With the advent of AI (Artificial Intelligence) and IoT (Internet of Things), technological advancements are reaching a different high to offer newer comfort to mankind. The latest and brightest inclusion is Smart City, which is ready to change the definition of

Access Control: A Must for Government organizations

Access Control: A Must for Government organizations

  May 14, 2018 |  User Data, Digitization

A couple of months back there was a piece of news flashing in Indian channels that Aadhar details of uncountable citizens have been compromised badly. Fortunately, that turned out to be a rumour and

fatal Data Security blunders

Evade these fatal Data Security blunders at any cost

  April 18, 2018 |  Authentication, Data Threat

With the impending execution of GDPR (General Data Protection Regulation), any potentially wrong data security decisions could lead to disastrous consequences for your business. Let us peruse some common data security mistakes that should be

Is your organization GDPR compliant?

Is your organization GDPR compliant?

  February 22, 2018 |  compliance, Audit

The compliance landscape with regard to data security is getting more and more stringent. Come May 2018, the General Data Protection Regulation (GDPR) comes into an effect. The regulation would make it mandatory for organizations-- doesn’t matter large or

Addressing the most common pain point for an enterprise

Privileged accounts security: Addressing the most common pain point for an enterprise

  February 16, 2018 |  Corporate Confidential , Data Breach

Organizations , in order to scale up operations and boost efficiency, have been adapting to newer technologies. The pace at which modern day enterprise is streamlining IT

Managing Privileged Accounts to fulfill compliance requirements

Managing Privileged Accounts to fulfill compliance requirements

  February 08, 2018 |  Compliance, Policies

The legal framework supporting cyber security is becoming increasingly stringent as modern day enterprises turn more digitized. Indeed, while digitization of business boosts operational efficiency, it also

Data:  Identifying threats

How Secure is your Data in Managed Service Environment?

  February 02, 2018 |  Business Risk, MSP

Innovation in technology is yielding significant results. Enterprises are gaining efficiency, operational flexibility along with cost reduction as cloud and Managed Service Provider (MSP) provides an alternative service space.

MSP or

Data:  Identifying threats

Data: Identifying threats

  November 14, 2017 |  Network Security, User Monitoring

Technology advancement has enabled organizations to gain efficiencies especially with respect to storing and processing data. Since there are multiple resources to store data, its security management is a big challenge. Indeed, what makes data vulnerable is its

Why enterprises need behavior analytics?

Why enterprises need behavior analytics?

  October 25, 2017 |  Network Security, User Monitoring

Modern day organizations face recurrent risks from cyber space. Information systems, as witnessed during the recent wave of advanced ransomware attacks, can be thrown out of gear, if the underlying security is not up to the

Revisiting security framework

Revisiting security framework

  October 08, 2017 |  information assets, Cyber incidents

When one of the world’s biggest internet companies reported a series of hacks that compromised confidentiality of hundreds of millions of users, it gave a sober warning to cyber community: organizations irrespective of their sizes are extremely vulnerable to

Protecting data in IOT era

Protecting data in IOT era

  September 06, 2017 |  Digital revolution, Vulnerabilities

To add value proposition and boost productivity for business, organizations have been transforming their day-to-day operations by investing more on the internet of things (IOTs).

Microprocessors and sensors connected to the internet add immense value to

Is your organization equipped for timely detection?

Is your organization equipped for timely detection?

  August 23, 2017 |  Data breach, Session monitoring

Theft or misuse of critical information assets from compromised insiders, in most cases, occurs as organizations fail to timely detect unusual or suspicious activities around privileged accounts— gateway to highly

Why it is essential to build resilience around privileged accounts?

Why it is essential to build resilience around privileged accounts?

  August 16, 2017 |  User behavior analytics, Access authorization

Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder, keeping our home safe and secure is always of utmost importance for

From emails to admin passwords leaks: rising vulnerability of media companies

From emails to admin passwords leaks: rising vulnerability of media companies

  August 09, 2017 |  Passwords Leaks, Cyber Crooks

Sophisticated cyber-attacks aimed at stealing confidential data and disabling IT systems are not just confined to banking, health care industry or government

Protecting privileged accounts … beyond the perimeter security

Protecting privileged accounts … beyond the perimeter security

  July 17, 2017 |  Firewalls, Malware and Ransomware Attacks

Perimeter security is receiving the utmost attention nowadays as advanced cyber threats originating from rogue state actors, hackers and cyber criminals targeting critical information

WannaCry attack: Time to shore up data and cyber security

WannaCry attack: Time to shore up data and cyber security

  June 01, 2017 |  Ransomware, Bitcoins, Data loss

The recent ransomware attack dubbed as WannaCry brings to the forefront one of the most recurrent challenges global organizations are confronting today: safeguarding business data from cyber crooks.

Indeed, as

Privileged Access Misuse: Four common mistakes firms make

Privileged Access Misuse: Four common mistakes firms make

  April 27, 2017 |  Critical Accounts, Authentication

Any modern-day enterprise’s information systems setup is not static. It grows as business expands. And as business goes through a transition period amidst rising amount of workloads shifting to cloud, the

Are datacenters fortified to prevent the misuse of shared privileged accounts?

How secured are you against data extrusion threat?

  April 18, 2017 |  BYOD, Data Breach, Identity Thefts

Having at the forefront of information risk management industry for more than a decade now, we have observed that enterprises remain most vulnerable in protecting their highly critical asset—data. Our

Are datacenters fortified to prevent the misuse of shared privileged accounts?

Are datacenters fortified to pevent the misuse of shared privileged accounts?

  February 27, 2017 |  Privileged Login Credentials, Datacenter, Biometrics

Amidst rising threat of cyber crime, enterprises today maintain datacenters with more robust security measures. To thwart and detect advanced

How malicious activities around privileged accounts go undetected?

How malicious activities around privileged accounts go undetected?

  February 17, 2017 |  Privilege Misuse, Database Layers, Identity and Access control

Structuring IT infrastructure in multiple layers of devices and applications brings many benefits.
As we discussed earlier, multiple layers of devices allow

How multiple IT set-up layers compromise privileged accounts?

How multiple IT set-up layers compromise privileged accounts?

  February 14, 2017 |  Root Accounts, Administrative Logins

In this digital age, data is the most valued asset for organizations. What we observe today is a quantum leap forward in the way organizations collate and manage data to comprehend business and

Are Fintech startups prepared to endure cyber risks?

Are Fintech startups prepared to endure cyber risks?

  February 10, 2017 |  Digital Payment Gateways, Regulatory Compliance

Probably the only startup fad that came any near to match present-day thrill surrounding the Fintech startup scene waswitnessed at the end of last decade when young motivated engineering and MBA grads presented exciting

Do you have a security net for Privileged accounts?

Do you have a security net for Privileged Accounts?

  February 03, 2017 |  Privileged Credentials, Insider Threats

Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of vital information (data) to stay ahead of the

Be mindful of your online footprints

Be mindful of your online footprints

  January 29, 2017 | Browsing pattern, Algorithms, Big Data

Those powerful sets of algorithms coded by search engine and social media giants have made human interaction on internet more purposeful and fruitful. Plan a holiday in  remote foothills of Himalayas or sunny beaches in Spain or surf online any popular

Slack cyber security readiness can bloat insurance policies

Slack cyber security readiness can bloat insurance policies

  January 16, 2017 | Cyber Insurance, DOS

That a failure to prevent cyber-attack can destabilize a business has led global CIOs and CISOs to up the ante against ever looming cybercrime in the last couple of years amidst a spate of highly sophisticated

Are you monitoring user behavior?

Are you monitoring user behavior?

  January 10, 2017 | Biometrics, Access Authentication

The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from cyber crook hacking a baby monitor to Mark Zuckerberg falling prey

Cyber Security Policies.jpg

Cyber Vulnerability: Five Common Mistakes Firms Make

  December 06, 2016 | Data Backup, Phishing, Malware

Notwithstanding big IT security budgets, global organizations are up to a big challenge. Incidents of hacking and data breaches surface far too often, undermining growing cyber vulnerabilities of companies.

From startups to

IPhone Vulnerability

Cashless Transactions: Great concept but are we prepared?

  November 29, 2016 | Demonetization, Access Authentication, Mobile Wallets

On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the circulation.

The decision is seen as a major crackdown on

Rising cyber thefts underscore banks

Datacenter: Maintain it like a fort

  November 16, 2016 | Datacenter, Sandboxing, Intrusion Detection System

Since prehistoric times, forts have a special significance in our lives. From medieval castles in Scotland to ancients forts built by Greeks, Romans, pre-independence princely states of India, and Egyptians-- these garrisons have played a crucial

Rising cyber thefts underscore banks

Rising cyber thefts underscore banks’ fragile online defenses

  November 9, 2016 | Computer Systems, Identity & Access Control

Typically, a bank’s customers throng in front of its gates when they fear that their hard-earned money might get disappeared due to financial institution’s irregularities. On so many occasions, as recently as the EU

Thefts of Digital Assets is Spiraling

Thefts of Digital Assets are Spiraling

  November 6, 2016 | Digital Assets, Privileged Identities

In an increasingly digitized business world,organizations are now measured by their ability to maintain a digital trust among investors, customers, and other stakeholders.

As discussed in our previous article ‘

Data Vulnerability

Data Security: Where global organizations err

  November 4, 2016 | Firewall, Data Detection Systems, Secure Configuration

As global firms grapple with increased cybercrimes, compliance managers are paying more heed to cyber security, especially the data.

Organizations now follow a strong IT security and governance policy, leading to more investments on

Identify Data breach

Is your Firm Prepared to Identify Data breach?

  October 19, 2016 | Identify Thefts, Data Security, Malicious Insider

Data Breach-- one of those excruciating costs which are keeping compliance managers and top managements on tenterhooks--is preventable, if firms possess necessary tools to identify malicious attempts to steal information, at the right

Failed M and A Deal

Compromised Digital Security Can Break Business Deals

  October 17, 2016 | Digital Security, Identity & Access Control Management

In an ever-expanding and integrated global economy, firms get assessed by their ability to adapt to changing dynamics in the business landscape.

Investors look at how fast and effectively firms innovate to grow—organically or

Blockchain Technology

Blockchain Technology: Is it completely foolproof?

  October 13, 2016 | Blockchain Technology, Algorithm Trading

Speed and efficiency are two of the most important cornerstones of the financial industry. To execute transactions at brisk pace while harvesting innumerable amount of data— financial companies from time to time adopt disruptive technologies to

Payment Networks

Online Payments: Pluck Those Low-Hanging Fruits

  October 12, 2016 | Payment Networks, Online Banking Apps

Breakthrough in online payments has significantly reduced complexities as a host of payment networks allow us to conveniently transfer payments-- anywhere and anytime.

But one big concern

Telecom Industry

How Telecom Companies can better Manage Risks

  October 02, 2016 | Telecom, Regulators, Compliance

About a year ago, a high-profile hacking incident at the U.K’s leading telecom operator Talk Talk, brought to the forefront many cyber security challenges faced by telecom companies across the world.

The company, which suffered breach of personal and financial

Rio Olympics Athletes Health Data Leaks

WADA Data Breach Lesson: Prioritize IT Spending

  September 30, 2016 | Cyber Assaults, Rio Olympics

Earlier in June, just about a month ago before the Reo Olympics, organizers had one big concern: How to boost cyber-defenses at a time when cybercriminals are becoming increasingly adept in bringing down IT systems during major

Social Media

Small Mistakes can erode Social Media’s Amazing Influence

  September 28, 2016 | Social Media, Data Breach, Passwords

Social Media: who would have thought about a decade ago thata host of websites and applications that allow social networking, will become a core part of our daily life?

Indeed, from running all sorts of promotional campaigns to familiarizing

cloud computing

As Firms Switch To Hybrid IT Environment, Data Security Will Need a Closer Look

  September 26, 2016 | Hybrid IT Environment, Data Breach, Privileged Identities

Disruptive technologies such as cloud computing offer many advantages to organizations. As the technology allows to store data in cloud service providers’ servers, it helps firms to cut IT-related

Secured Data

Have You Secured Those Master Keys to Your IT Network?

  September 15, 2016 | Privileged Access, Data Security, Data Breach

Data breaches continued to haunt corporations across the world. From Japan’s largest travel agency to UK’s leading accounting software firm and from America’s prominent hospital chain to Africa’s emerging financial institutions, organizations spanning

Fraudulent Money Transfer

This Lurking Threat for Banks from Cyberspace Needs Urgent Response

  September 12, 2016 | Cyber Heist, Financial Institutions, Privileged Accounts

The $ 101 million cyber heist at the Central Bank of Bangladesh, earlier this

IPhone Vulnerability

Cost of a Data Breach: Losing Trust, Reputation & Productivity

  September 07, 2016 | Unauthorized Access, Insider, Identity & Access Control

Malicious insider yet again played a key role behind a data breach. Last month a well-known British accounting Software firm suffered a

IPhone Vulnerability

IPhone Vulnerability: What the Incident Taught Us?

  September 06, 2016 | IPhone, iOS, Security Updates

Cyber security is one of the biggest challenges for global organizations. Equipped with advanced tools, cyber criminals are increasingly targeting firms’ IT systems, which in spite of higher infrastructure budgeting, remain vulnerable even at the slightest of

Cyber Vulnerability Compliance

Cyber Security Compliance: Are Compliance Managers and Managements on the Same Page?

  September 02, 2016 | Data Exfiltration, Compliance, Cyber Security, Risk

The topmost risk that today organizations share across all geographies is the threat emanating from cyberspace. While there is no denying of the fact that innumerable

Vital Infrastructure

Attacks on Vital Infrastructure: Are Nations Prepared to Avert Catastrophes?

  September 01, 2016 | Critical Infrastructure, Digital War, Cyber Vulnerability

Information technology has significantly transformed the world. Today, it plays a big part in our lives, allowing us to streamline our everyday activities. It also has a significant role in nation-building.

Malwares in Your Mobile Phones

These Malwares in Your Mobile Phones Can Drain Bank Accounts

  August 31 2016 | Biometrics, Malicious Software, Access Control

In one of our previous articles in this section, we discussed how financial institutions are grappling with growing incidents of identity thefts and data breaches. Citing the example of the U.S., where a series of breaches involving

Cyber Espionage

How Much Secured Are You in the Age of Digital War?

  August 29, 2016 | Cyber Espionage, Cyber Security

Rummage into some of the past factual tales of spy agencies then you will realize how the world of espionage is chockfull with intriguing, incredible, but terrifying acts. From the CIA to KGB and from Mossad to MI6, the secret dark world of espionage resulted in

Drone Security

Ever Thought Drones Could Unleash Cyber Attacks?

  August 25, 2016 | Drones, Cyber Espionage, Data

Protecting highly-classified data has become one of the biggest challenges for organizations across the world, particularly in the era of ‘big

Computerized Mining

Future of Automated Mining: Efficient but at Risk

  August 24, 2016 | Supercomputers, Conveyor Belts, Artificial Intelligence

Necessity is the mother of invention so goes the saying. It could not hold truer for any other industry than the mining business. Hard pressed by a prolonged period of depressed commodity prices, the industry is finding creative ways to

Cyber Security Policies

Do You Have a Cyber Security Policy in Place?

  August 22, 2016 | Identity Thefts, Secured Configuration, Big Data

Investments on New Technologies is Fine but Risks Mitigation Policy Equally Vital

Hacking of

Password Hacking

Are Your Business Emails Secured?

  August 19, 2016 | Scam-Emails, Cyber-Frauds, Hacking, Secured Configuration, Identity and Access Control, Servers

Fraudsters are now increasingly targeting business emails. According to FBI data, more than 22,000 businesses -- small and big-sized-- got targeted through dubious emails between October 2013 and

Cyber Attacks

Geopolitical Tensions Can Now Spill Over into Cyberspace

  August 18, 2016 | Cyber Warfare, Denial-of-Service (DOS), Cybersecurity, Malicious Software, South China Sea, Cyberspace

Geopolitical tensions have turned into a one of the biggest sources of cross-border cyber-assaults. Indeed, as nations collide over prolonged simmering bilateral or multilateral disputes, the

Cyber Attacks

Identity Thefts a Prime Concern but DOS Attacks Equally Damaging

  August 17, 2016 | Denial-of-Service (DOS), Identity Thefts, Cyber-Heist, Access Control, Secured Configuration

Cyber-frauds such as identity thefts and financial data breaches continued to damage global corporations this year despite increased IT security budgets. Poor

Wearable Fitness Devices

Wearable Fitness Devices: Tab on Health but Vulnerable to Hacking

  August 16, 2016 | Wearable Fitness Devices, Database, Data Privacy, Hacking, Risks

Who would have thought about a decade ago that watches and wrist-bands could help us keeping fit and healthy? But then the technology in our age is advancing at a lightning speed, churning out amazing

Machine Learning Algorithm

Don’t Compromise on Security for Convenience

  August 10, 2016 | Identity Thefts, IT Security, Hacking, Bitcoin, Passwords Keys, Cyber Attacks, Cyber Frauds 

Recent hacking at the Bitfinex Exchange raise questions over how we manage our vital information

Despite companies spending billions of dollars on

Machine Learning Algorithm

Trading Algorithms: Fast and Cost Effective but Extremely Vulnerable

  August 09, 2016 | Algorithms, Hacking, Vulnerability, Malicious Insiders,  Artificial Intelligence

Trading algorithms or “algos”, the highly advanced, automated, but complex tools, allow modern-day asset managers, individual traders to find highly lucrative trading opportunities by

Big Data

Poor Cybercrime Prosecution Rate Can Stifle IT Growth

  August 08, 2016 | Cybercrime, Prosecution Rate, Identity Thefts, Financial Data Breach, Cybersecurity Regulations, Access Control

As businesses across the world grapple with growing incidents of identity thefts, financial data breaches, and other forms of cybercrimes, governments and central banks are

Big Data

The Quagmire of ‘Big Data’

  August 05, 2016 | Data, Big Data, Identity Thefts, Insiders, Data Security, Malicious Insiders

Gaining competitive advantage over business rivals remains as the topmost concern for any business. To do this, organizations ceaselessly work to improve all business areas. Bringing new products into the market, driving innovation in

Unmanned Automated Fighter Planes

Why Risks Loom Over Despite Deploying Security Measures

  August 04, 2016 | Security, Sandboxing, Encryption, Firewall, Insider Threat, Cyberspace, Data

Organizations usually have a tendency to safeguard IT systems against external vulnerabilities but often insider threats are overlooked.

Very often IT security product developers

Unmanned Automated Fighter Planes

Will Unmanned Automated Fighter Planes be Vulnerable?

August 02, 2016 | Avionics, Unmanned Automated Fighter Planes, Algorithm

Avionics engineering has evolved a long way. From presumably the first-ever German fighter plane  Messerschmitt Me 262, dubbed as Schwalbe, which performed roles like light bombing and

Pokemon Go

Your Favorite Smartphone Game Downloads are Not Safe

July 29, 2016 | Augmented Reality, Personal Data, Security

Augmented reality (AR) smartphone game, Pokémon Go, got launched in several markets few days ago. The game turned out as an instant hit everywhere. The number of downloads of Pokémon Go game in first few days after the launch, easily surpassed

Aviation Industry

Compromised Privileged Identities can ‘Land’ Airline Companies in Trouble

July 27, 2016 | Privileged Identities, Cyber Security, Cyber Threats

Ever-expanding cyberspace amid increasing digitization of businesses boosted global trade, commerce, and innovation; risks and vulnerabilities, however, also increased due to Cyber-frauds.

US elections

Increasing Cyber-Threats to Drug-Makers

July 26, 2016 | Cyber-Threats, Risks, Data Breach, Cyber Security

No other industry is more vulnerable to risks and uncertainties than drug-makers. It takes years for drug-makers to develop a new treatment. These companies pour-in millions of dollars to discover new molecules that could help

US elections

U.S. Presidential Elections: What Email Leaks Point to?

July 25, 2016 | Hacktivists, Privileged Accounts, Data Leaks, Vulnerable Access

A spate of email leaks during a run-up to the US Presidential elections has left Democrats hiding for a cover; but it also shows how critical information is always vulnerable to hacking.


ASEAN Integration: Governments Should Pay More Heed to Cyber Security Regulations

July 21, 2016 | Cyber Security, Regulation, ASEAN

Britain’s decision to leave the European Union (EU) last month left many dumbfounded. It rattled markets; and, unnerved the global market sentiment. That decision, however, failed to influence the Association of

Artificial Intelligence

Artificial Intelligence: Incredible Possibilities but Devastating Risks

July 20, 2016 | Artificial Intelligence, Risks, Security

Our experience of Artificial Intelligence (AI), in general, is limited to Hollywood movies, wherein robots working on AI performs

Password Management

Data Breach: Adapting to Biometrics is Only the Half Job Done

July 18, 2016 | Biometric Access, Identity Theft, Privileged Identity/Access Management

Identity theft remains one of the biggest concerns for banking institutions across the world. The number of data breach incidents have jumped manifold as cybercriminals now have advanced

Secured Financial Transactions

SWIFT’s Decision to Hire Cybersecurity Firms is Step in a Right Direction; but Banks Need to Do More

July 15, 2016 | Privileged Identities, IT Security, Privileged Access Management, Security Breach

Earlier this week, the world’s biggest money-transfer system, Society for the Worldwide Interbank

Perils of 3D Printing Technology

Perils of 3D Printing Technology

July 13, 2016 | 3D Printing, Computer Assisted Design

Cost, quality, and efficiency, these are the key metrics that any organization--be it a manufacturing company, financial institution or a service agency-- strives to improve, relentlessly. A sound operations management forms the basis of a fundamental

Increasing Digitalized African Economy Need a Closer Look at IT Security

Increasing Digitalized African Economy Need a Closer Look at IT Security

July 12, 2016 | Privileged Access Management, Identity-Theft, Intellectual Property

The African economy has been through an amazing transition in the recent years as a rapid digitalization of


Autonomous Vehicles: Have Manufacturers Addressed All Safety Concerns?

July 11, 2016 | Autonomous Vehicles, Hacking

Probably the two most talked about topics in the world of emerging technology are autonomous vehicles and the internet of things. Amid its ever rising popularity, intelligent technology is expected to


Data Breach: Stolen Sensitive Data is a New Commodity

   July 05, 2016   |   Data Breach, Privilege Misuse

As cybercriminals turn more technology savvy, possessing necessary tools and competence to breach your IT security systems, businesses across the world, are facing a grave challenge, which is to protect sensitive data from hackers.

 Organized cybercriminals, rogue hackers, and


The Internet of Things: Puts You at Ease but with Risks

   July 04, 2016   |   Internet of Things, Denial-of-Services

Disruptive technologies such as cloud computing, and the internet of things have made our lives at ease, efficient, exciting, and above all, it has spurred innovation. Think about the Internet of Things (IOT). Young tech


Product In Action

Follow us

ARCON on Facebook ARCON on Twitter ARCON on LinkedIn ARCON on Youtube ARCON on Instagram

Keep in Touch

   This email address is being protected from spambots. You need JavaScript enabled to view it.
+91 22 4221 5300  (INDIA)  
+97143633637 / +971507080970  (MIDDLE EAST)  
  (212)-537-6519   (USA)  
  +61- (02)8006-1236   (Australia)  

   Get Directions