Access Control: A Must for Government organizations
May 14, 2018 | User Data, Digitization
A couple of months back there was a news flashing in Indian channels that Aadhar details of uncountable citizens has been compromised badly. Fortunately that turned out to be a rumour and UIDAI chief
Evade these fatal Data Security blunders at any cost
April 18, 2018 | Authentication, Data Threat
With the impending execution of GDPR (General Data Protection Regulation), any potentially wrong data security decisions could lead to disastrous consequences for your business. Let us peruse some common data security mistakes that should be
Is your organization GDPR compliant?
February 22, 2018 | compliance, Audit
The compliance landscape with regard to data security is getting more and more stringent. Come May 2018, the General Data Protection Regulation (GDPR) comes into an effect. The regulation would make it mandatory for organizations-- doesn’t matter large or
Privileged accounts security: Addressing the most common pain point for an enterprise
February 16, 2018 | Corporate Confidential , Data Breach
Organizations , in order to scale up operations and boost efficiency, have been adapting to newer technologies. The pace at which modern day enterprise is streamlining IT
Managing Privileged Accounts to fulfill compliance requirements
February 08, 2018 | Compliance, Policies
The legal framework supporting cyber security is becoming increasingly stringent as modern day enterprises turn more digitized. Indeed, while digitization of business boosts operational efficiency, it also
How Secure is your Data in Managed Service Environment?
February 02, 2018 | Business Risk, MSP
Innovation in technology is yielding significant results. Enterprises are gaining efficiency, operational flexibility along with cost reduction as cloud and Managed Service Provider (MSP) provides an alternative service space.
Data: Identifying threats
November 14, 2017 | Network Security, User Monitoring
Technology advancement has enabled organizations to gain efficiencies especially with respect to storing and processing data. Since there are multiple resources to store data, its security management is a big challenge. Indeed, what makes data vulnerable is its
Why enterprises need behavior analytics?
October 25, 2017 | Network Security, User Monitoring
Modern day organizations face recurrent risks from cyber space. Information systems, as witnessed during the recent wave of advanced ransomware attacks, can be thrown out of gear, if the underlying security is not up to the
Revisiting security framework
October 08, 2017 | information assets, Cyber incidents
When one of the world’s biggest internet companies reported a series of hacks that compromised confidentiality of hundreds of millions of users, it gave a sober warning to cyber community: organizations irrespective of their sizes are extremely vulnerable to
Protecting data in IOT era
September 06, 2017 | Digital revolution, Vulnerabilities
To add value proposition and boost productivity for business, organizations have been transforming their day-to-day operations by investing more on the internet of things (IOTs).
Microprocessors and sensors connected to the internet add immense value to
Is your organization equipped for timely detection?
August 23, 2017 | Data breach, Session monitoring
Theft or misuse of critical information assets from compromised insiders, in most cases, occurs as organizations fail to timely detect unusual or suspicious activities around privileged accounts— gateway to highly
Why it is essential to build resilience around privileged accounts?
August 16, 2017 | User behavior analytics, Access authorization
Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder, keeping our home safe and secure is always of utmost importance for
From emails to admin passwords leaks: rising vulnerability of media companies
August 09, 2017 | Passwords Leaks, Cyber Crooks
Sophisticated cyber-attacks aimed at stealing confidential data and disabling IT systems are not just confined to banking, health care industry or government
Protecting privileged accounts … beyond the perimeter security
July 17, 2017 | Firewalls, Malware and Ransomware Attacks
Perimeter security is receiving the utmost attention nowadays as advanced cyber threats originating from rogue state actors, hackers and cyber criminals targeting critical information
WannaCry attack: Time to shore up data and cyber security
June 01, 2017 | Ransomware, Bitcoins, Data loss
The recent ransomware attack dubbed as WannaCry brings to the forefront one of the most recurrent challenges global organizations are confronting today: safeguarding business data from cyber crooks.
Privileged Access Misuse: Four common mistakes firms make
April 27, 2017 | Critical Accounts, Authentication
Any modern-day enterprise’s information systems setup is not static. It grows as business expands. And as business goes through a transition period amidst rising amount of workloads shifting to cloud, the
How secured are you against data extrusion threat?
April 18, 2017 | BYOD, Data Breach, Identity Thefts
Having at the forefront of information risk management industry for more than a decade now, we have observed that enterprises remain most vulnerable in protecting their highly critical asset—data. Our
Are datacenters fortified to pevent the misuse of shared privileged accounts?
February 27, 2017 | Privileged Login Credentials, Datacenter, Biometrics
Amidst rising threat of cyber crime, enterprises today maintain datacenters with more robust security measures. To thwart and detect advanced
How malicious activities around privileged accounts go undetected?
February 17, 2017 | Privilege Misuse, Database Layers, Identity and Access control
Structuring IT infrastructure in multiple layers of devices and applications brings many benefits.
As we discussed earlier, multiple layers of devices allow
How multiple IT set-up layers compromise privileged accounts?
February 14, 2017 | Root Accounts, Administrative Logins
In this digital age, data is the most valued asset for organizations. What we observe today is a quantum leap forward in the way organizations collate and manage data to comprehend business and
Are Fintech startups prepared to endure cyber risks?
February 10, 2017 | Digital Payment Gateways, Regulatory Compliance
Probably the only startup fad that came any near to match present-day thrill surrounding the Fintech startup scene waswitnessed at the end of last decade when young motivated engineering and MBA grads presented exciting
Do you have a security net for Privileged Accounts?
February 03, 2017 | Privileged Credentials, Insider Threats
Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of vital information (data) to stay ahead of the
Be mindful of your online footprints
January 29, 2017 | Browsing pattern, Algorithms, Big Data
Those powerful sets of algorithms coded by search engine and social media giants have made human interaction on internet more purposeful and fruitful. Plan a holiday in remote foothills of Himalayas or sunny beaches in Spain or surf online any popular
Slack cyber security readiness can bloat insurance policies
January 16, 2017 | Cyber Insurance, DOS
That a failure to prevent cyber-attack can destabilize a business has led global CIOs and CISOs to up the ante against ever looming cybercrime in the last couple of years amidst a spate of highly sophisticated
Are you monitoring user behavior?
January 10, 2017 | Biometrics, Access Authentication
The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from cyber crook hacking a baby monitor to Mark Zuckerberg falling prey
Cyber Vulnerability: Five Common Mistakes Firms Make
December 06, 2016 | Data Backup, Phishing, Malware
Notwithstanding big IT security budgets, global organizations are up to a big challenge. Incidents of hacking and data breaches surface far too often, undermining growing cyber vulnerabilities of companies.
From startups to
Cashless Transactions: Great concept but are we prepared?
November 29, 2016 | Demonetization, Access Authentication, Mobile Wallets
On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the circulation.
The decision is seen as a major crackdown on
Datacenter: Maintain it like a fort
November 16, 2016 | Datacenter, Sandboxing, Intrusion Detection System
Since prehistoric times, forts have a special significance in our lives. From medieval castles in Scotland to ancients forts built by Greeks, Romans, pre-independence princely states of India, and Egyptians-- these garrisons have played a crucial
Rising cyber thefts underscore banks’ fragile online defenses
November 9, 2016 | Computer Systems, Identity & Access Control
Typically, a bank’s customers throng in front of its gates when they fear that their hard-earned money might get disappeared due to financial institution’s irregularities. On so many occasions, as recently as the EU
Thefts of Digital Assets are Spiraling
November 6, 2016 | Digital Assets, Privileged Identities
In an increasingly digitized business world,organizations are now measured by their ability to maintain a digital trust among investors, customers, and other stakeholders.
Data Security: Where global organizations err
November 4, 2016 | Firewall, Data Detection Systems, Secure Configuration
As global firms grapple with increased cybercrimes, compliance managers are paying more heed to cyber security, especially the data.
Organizations now follow a strong IT security and governance policy, leading to more investments on
Is your Firm Prepared to Identify Data breach?
October 19, 2016 | Identify Thefts, Data Security, Malicious Insider
Data Breach-- one of those excruciating costs which are keeping compliance managers and top managements on tenterhooks--is preventable, if firms possess necessary tools to identify malicious attempts to steal information, at the right
Compromised Digital Security Can Break Business Deals
October 17, 2016 | Digital Security, Identity & Access Control Management
In an ever-expanding and integrated global economy, firms get assessed by their ability to adapt to changing dynamics in the business landscape.
Investors look at how fast and effectively firms innovate to grow—organically or
Blockchain Technology: Is it completely foolproof?
October 13, 2016 | Blockchain Technology, Algorithm Trading
Speed and efficiency are two of the most important cornerstones of the financial industry. To execute transactions at brisk pace while harvesting innumerable amount of data— financial companies from time to time adopt disruptive technologies to
Online Payments: Pluck Those Low-Hanging Fruits
October 12, 2016 | Payment Networks, Online Banking Apps
Breakthrough in online payments has significantly reduced complexities as a host of payment networks allow us to conveniently transfer payments-- anywhere and anytime.
But one big concern
How Telecom Companies can better Manage Risks
October 02, 2016 | Telecom, Regulators, Compliance
About a year ago, a high-profile hacking incident at the U.K’s leading telecom operator Talk Talk, brought to the forefront many cyber security challenges faced by telecom companies across the world.
The company, which suffered breach of personal and financial
WADA Data Breach Lesson: Prioritize IT Spending
September 30, 2016 | Cyber Assaults, Rio Olympics
Earlier in June, just about a month ago before the Reo Olympics, organizers had one big concern: How to boost cyber-defenses at a time when cybercriminals are becoming increasingly adept in bringing down IT systems during major
Small Mistakes can erode Social Media’s Amazing Influence
September 28, 2016 | Social Media, Data Breach, Passwords
Social Media: who would have thought about a decade ago thata host of websites and applications that allow social networking, will become a core part of our daily life?
Indeed, from running all sorts of promotional campaigns to familiarizing
As Firms Switch To Hybrid IT Environment, Data Security Will Need a Closer Look
September 26, 2016 | Hybrid IT Environment, Data Breach, Privileged Identities
Disruptive technologies such as cloud computing offer many advantages to organizations. As the technology allows to store data in cloud service providers’ servers, it helps firms to cut IT-related
Have You Secured Those Master Keys to Your IT Network?
September 15, 2016 | Privileged Access, Data Security, Data Breach
Data breaches continued to haunt corporations across the world. From Japan’s largest travel agency to UK’s leading accounting software firm and from America’s prominent hospital chain to Africa’s emerging financial institutions, organizations spanning
IPhone Vulnerability: What the Incident Taught Us?
September 06, 2016 | IPhone, iOS, Security Updates
Cyber security is one of the biggest challenges for global organizations. Equipped with advanced tools, cyber criminals are increasingly targeting firms’ IT systems, which in spite of higher infrastructure budgeting, remain vulnerable even at the slightest of
Cyber Security Compliance: Are Compliance Managers and Managements on the Same Page?
September 02, 2016 | Data Exfiltration, Compliance, Cyber Security, Risk
The topmost risk that today organizations share across all geographies is the threat emanating from cyberspace. While there is no denying of the fact that innumerable
Attacks on Vital Infrastructure: Are Nations Prepared to Avert Catastrophes?
September 01, 2016 | Critical Infrastructure, Digital War, Cyber Vulnerability
Information technology has significantly transformed the world. Today, it plays a big part in our lives, allowing us to streamline our everyday activities. It also has a significant role in nation-building.
These Malwares in Your Mobile Phones Can Drain Bank Accounts
August 31 2016 | Biometrics, Malicious Software, Access Control
In one of our previous articles in this section, we discussed how financial institutions are grappling with growing incidents of identity thefts and data breaches. Citing the example of the U.S., where a series of breaches involving
How Much Secured Are You in the Age of Digital War?
August 29, 2016 | Cyber Espionage, Cyber Security
Rummage into some of the past factual tales of spy agencies then you will realize how the world of espionage is chockfull with intriguing, incredible, but terrifying acts. From the CIA to KGB and from Mossad to MI6, the secret dark world of espionage resulted in
Future of Automated Mining: Efficient but at Risk
August 24, 2016 | Supercomputers, Conveyor Belts, Artificial Intelligence
Necessity is the mother of invention so goes the saying. It could not hold truer for any other industry than the mining business. Hard pressed by a prolonged period of depressed commodity prices, the industry is finding creative ways to
Are Your Business Emails Secured?
August 19, 2016 | Scam-Emails, Cyber-Frauds, Hacking, Secured Configuration, Identity and Access Control, Servers
Fraudsters are now increasingly targeting business emails. According to FBI data, more than 22,000 businesses -- small and big-sized-- got targeted through dubious emails between October 2013 and
Geopolitical Tensions Can Now Spill Over into Cyberspace
August 18, 2016 | Cyber Warfare, Denial-of-Service (DOS), Cybersecurity, Malicious Software, South China Sea, Cyberspace
Geopolitical tensions have turned into a one of the biggest sources of cross-border cyber-assaults. Indeed, as nations collide over prolonged simmering bilateral or multilateral disputes, the
Identity Thefts a Prime Concern but DOS Attacks Equally Damaging
August 17, 2016 | Denial-of-Service (DOS), Identity Thefts, Cyber-Heist, Access Control, Secured Configuration
Wearable Fitness Devices: Tab on Health but Vulnerable to Hacking
August 16, 2016 | Wearable Fitness Devices, Database, Data Privacy, Hacking, Risks
Who would have thought about a decade ago that watches and wrist-bands could help us keeping fit and healthy? But then the technology in our age is advancing at a lightning speed, churning out amazing
Don’t Compromise on Security for Convenience
August 10, 2016 | Identity Thefts, IT Security, Hacking, Bitcoin, Passwords Keys, Cyber Attacks, Cyber Frauds
Recent hacking at the Bitfinex Exchange raise questions over how we manage our vital information
Despite companies spending billions of dollars on
Trading Algorithms: Fast and Cost Effective but Extremely Vulnerable
August 09, 2016 | Algorithms, Hacking, Vulnerability, Malicious Insiders, Artificial Intelligence
Trading algorithms or “algos”, the highly advanced, automated, but complex tools, allow modern-day asset managers, individual traders to find highly lucrative trading opportunities by
Poor Cybercrime Prosecution Rate Can Stifle IT Growth
August 08, 2016 | Cybercrime, Prosecution Rate, Identity Thefts, Financial Data Breach, Cybersecurity Regulations, Access Control
As businesses across the world grapple with growing incidents of identity thefts, financial data breaches, and other forms of cybercrimes, governments and central banks are
The Quagmire of ‘Big Data’
August 05, 2016 | Data, Big Data, Identity Thefts, Insiders, Data Security, Malicious Insiders
Gaining competitive advantage over business rivals remains as the topmost concern for any business. To do this, organizations ceaselessly work to improve all business areas. Bringing new products into the market, driving innovation in
Why Risks Loom Over Despite Deploying Security Measures
August 04, 2016 | Security, Sandboxing, Encryption, Firewall, Insider Threat, Cyberspace, Data
Organizations usually have a tendency to safeguard IT systems against external vulnerabilities but often insider threats are overlooked.
Very often IT security product developers
Will Unmanned Automated Fighter Planes be Vulnerable?
August 02, 2016 | Avionics, Unmanned Automated Fighter Planes, Algorithm
Avionics engineering has evolved a long way. From presumably the first-ever German fighter plane Messerschmitt Me 262, dubbed as Schwalbe, which performed roles like light bombing and
Your Favorite Smartphone Game Downloads are Not Safe
July 29, 2016 | Augmented Reality, Personal Data, Security
Augmented reality (AR) smartphone game, Pokémon Go, got launched in several markets few days ago. The game turned out as an instant hit everywhere. The number of downloads of Pokémon Go game in first few days after the launch, easily surpassed
Compromised Privileged Identities can ‘Land’ Airline Companies in Trouble
July 27, 2016 | Privileged Identities, Cyber Security, Cyber Threats
Ever-expanding cyberspace amid increasing digitization of businesses boosted global trade, commerce, and innovation; risks and vulnerabilities, however, also increased due to Cyber-frauds.
Increasing Cyber-Threats to Drug-Makers
July 26, 2016 | Cyber-Threats, Risks, Data Breach, Cyber Security
No other industry is more vulnerable to risks and uncertainties than drug-makers. It takes years for drug-makers to develop a new treatment. These companies pour-in millions of dollars to discover new molecules that could help
U.S. Presidential Elections: What Email Leaks Point to?
July 25, 2016 | Hacktivists, Privileged Accounts, Data Leaks, Vulnerable Access
A spate of email leaks during a run-up to the US Presidential elections has left Democrats hiding for a cover; but it also shows how critical information is always vulnerable to hacking.
ASEAN Integration: Governments Should Pay More Heed to Cyber Security Regulations
July 21, 2016 | Cyber Security, Regulation, ASEAN
Britain’s decision to leave the European Union (EU) last month left many dumbfounded. It rattled markets; and, unnerved the global market sentiment. That decision, however, failed to influence the Association of
Artificial Intelligence: Incredible Possibilities but Devastating Risks
July 20, 2016 | Artificial Intelligence, Risks, Security
Our experience of Artificial Intelligence (AI), in general, is limited to Hollywood movies, wherein robots working on AI performs
Data Breach: Adapting to Biometrics is Only the Half Job Done
July 18, 2016 | Biometric Access, Identity Theft, Privileged Identity/Access Management
Identity theft remains one of the biggest concerns for banking institutions across the world. The number of data breach incidents have jumped manifold as cybercriminals now have advanced
SWIFT’s Decision to Hire Cybersecurity Firms is Step in a Right Direction; but Banks Need to Do More
July 15, 2016 | Privileged Identities, IT Security, Privileged Access Management, Security Breach
Earlier this week, the world’s biggest money-transfer system, Society for the Worldwide Interbank
Perils of 3D Printing Technology
July 13, 2016 | 3D Printing, Computer Assisted Design
Cost, quality, and efficiency, these are the key metrics that any organization--be it a manufacturing company, financial institution or a service agency-- strives to improve, relentlessly. A sound operations management forms the basis of a fundamental
Increasing Digitalized African Economy Need a Closer Look at IT Security
July 12, 2016 | Privileged Access Management, Identity-Theft, Intellectual Property
The African economy has been through an amazing transition in the recent years as a rapid digitalization of
Autonomous Vehicles: Have Manufacturers Addressed All Safety Concerns?
July 11, 2016 | Autonomous Vehicles, Hacking
Probably the two most talked about topics in the world of emerging technology are autonomous vehicles and the internet of things. Amid its ever rising popularity, intelligent technology is expected to
Data Breach: Stolen Sensitive Data is a New Commodity
July 05, 2016 | Data Breach, Privilege Misuse
As cybercriminals turn more technology savvy, possessing necessary tools and competence to breach your IT security systems, businesses across the world, are facing a grave challenge, which is to protect sensitive data from hackers.
Organized cybercriminals, rogue hackers, and
The Internet of Things: Puts You at Ease but with Risks
July 04, 2016 | Internet of Things, Denial-of-Services
Disruptive technologies such as cloud computing, and the internet of things have made our lives at ease, efficient, exciting, and above all, it has spurred innovation. Think about the Internet of Things (IOT). Young tech
Will the Recent Unfolding of Events in the EU Impact Indian Software Firms?
July 01, 2016 | Business Uncertainty, Software
As the dust settles down after a mayhem sparked off by the shocking referendum outcome in Britain, we look at whether the Indian software firms could feel the impact in the near to middle
Will China Enforce Tougher Cyber security Laws?
June 30, 2016 | Cybersecurity Regulations, Cyberspace, GRC, User Data
China, the world’s second largest economy, and home to some globally renowned technology companies, ironically, remains as one of the most standoffish country when it comes allowing access to
Rio Olympics: Threats from “Hacktivists” and Organized Cybercriminals
June 29, 2016 | Cyber-defenses, Cloud, Cyberattacks, Hacktivists
However, one of the most daunting tasks for organizers nowadays is to ensure cyber-defenses is up to the mark.
Come August 5, Brazil’s lively city, Rio de Janeiro will be hosting Olympics 2016. Millions of people from
Insider Threats to Critical IT Assets is on the Rise
July 05, 2016 | Privileged Access Management, Insider Threat, Data-Breach
Data-breach incidents nowadays have not just become far too rampant but the losses arising out of those attacks have also risen sharply. A recent annual Cost of Data Breach Study commissioned by IBM and
How Britain’s Decision to Leave the EU can Affect Cybersecurity Market
June 27, 2016 | Cyber Security, Risk, Cyber Threats
As Britain faces a glaring reality of its disintegrating influence in the global arena following a shocking poll outcome which saw a majority of Britons preferring to leave the European Union, we take a quick look at how the decision could
Japan Looks to Fortify IT Systems as it Prepares for Possible Cyberattacks in Olympics 2020
June 27, 2016 | IT Systems, Cyber Attacks, Privileged Access Management
There was a time when Japan was relatively immune to cyberattacks. Indeed, in 2013, Asia’s second largest economy reported 310 million cyberattacks—a not so high number of attacks considering its
Brexit Rattles Global Markets, Impending Uncertainties and Risks for Britain and the EU
June 24, 2016 | Brexit, Cyber Attacks, Global Markets
As widely feared, Britons have decided to leave the European Union (EU). In a closely
Regulators Warn Bitcoin can ‘Potentially Create Financial Stability Risk’
June 22, 2016 | Risk, Bitcoin, Cyber Crime
Bitcoin, a cyber-currency, has received some flak from the influential circles in the US amidst its growing popularity.
US regulators, which include, The Treasury Department, the Federal Reserve and the Securities and Exchange
Possible Risks in Case of a #Brexit
June 22, 2016 | #Brexit, Risk, IT assets,IT security
Ahead of the crucial referendum on #Brexit, which will be held on Thursday June 23rd, Britain, including global market participants, remain edgy.
There is a growing curiosity over whether Britain will or will not choose to remain within the European Union, and more importantly,