Access Control: A Must for Government organizations

Access Control: A Must for Government organizations

  May 14, 2018 |  User Data, Digitization

A couple of months back there was a news flashing in Indian channels that Aadhar details of uncountable citizens has been compromised badly. Fortunately that turned out to be a rumour and UIDAI chief

fatal Data Security blunders

Evade these fatal Data Security blunders at any cost

  April 18, 2018 |  Authentication, Data Threat

With the impending execution of GDPR (General Data Protection Regulation), any potentially wrong data security decisions could lead to disastrous consequences for your business. Let us peruse some common data security mistakes that should be

Is your organization GDPR compliant?

Is your organization GDPR compliant?

  February 22, 2018 |  compliance, Audit

The compliance landscape with regard to data security is getting more and more stringent. Come May 2018, the General Data Protection Regulation (GDPR) comes into an effect. The regulation would make it mandatory for organizations-- doesn’t matter large or

Addressing the most common pain point for an enterprise

Privileged accounts security: Addressing the most common pain point for an enterprise

  February 16, 2018 |  Corporate Confidential , Data Breach

Organizations , in order to scale up operations and boost efficiency, have been adapting to newer technologies. The pace at which modern day enterprise is streamlining IT

Managing Privileged Accounts to fulfill compliance requirements

Managing Privileged Accounts to fulfill compliance requirements

  February 08, 2018 |  Compliance, Policies

The legal framework supporting cyber security is becoming increasingly stringent as modern day enterprises turn more digitized. Indeed, while digitization of business boosts operational efficiency, it also

Data:  Identifying threats

How Secure is your Data in Managed Service Environment?

  February 02, 2018 |  Business Risk, MSP

Innovation in technology is yielding significant results. Enterprises are gaining efficiency, operational flexibility along with cost reduction as cloud and Managed Service Provider (MSP) provides an alternative service space.

MSP or

Data:  Identifying threats

Data: Identifying threats

  November 14, 2017 |  Network Security, User Monitoring

Technology advancement has enabled organizations to gain efficiencies especially with respect to storing and processing data. Since there are multiple resources to store data, its security management is a big challenge. Indeed, what makes data vulnerable is its

Why enterprises need behavior analytics?

Why enterprises need behavior analytics?

  October 25, 2017 |  Network Security, User Monitoring

Modern day organizations face recurrent risks from cyber space. Information systems, as witnessed during the recent wave of advanced ransomware attacks, can be thrown out of gear, if the underlying security is not up to the

Revisiting security framework

Revisiting security framework

  October 08, 2017 |  information assets, Cyber incidents

When one of the world’s biggest internet companies reported a series of hacks that compromised confidentiality of hundreds of millions of users, it gave a sober warning to cyber community: organizations irrespective of their sizes are extremely vulnerable to

Protecting data in IOT era

Protecting data in IOT era

  September 06, 2017 |  Digital revolution, Vulnerabilities

To add value proposition and boost productivity for business, organizations have been transforming their day-to-day operations by investing more on the internet of things (IOTs).

Microprocessors and sensors connected to the internet add immense value to

Is your organization equipped for timely detection?

Is your organization equipped for timely detection?

  August 23, 2017 |  Data breach, Session monitoring

Theft or misuse of critical information assets from compromised insiders, in most cases, occurs as organizations fail to timely detect unusual or suspicious activities around privileged accounts— gateway to highly

Why it is essential to build resilience around privileged accounts?

Why it is essential to build resilience around privileged accounts?

  August 16, 2017 |  User behavior analytics, Access authorization

Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder, keeping our home safe and secure is always of utmost importance for

From emails to admin passwords leaks: rising vulnerability of media companies

From emails to admin passwords leaks: rising vulnerability of media companies

  August 09, 2017 |  Passwords Leaks, Cyber Crooks

Sophisticated cyber-attacks aimed at stealing confidential data and disabling IT systems are not just confined to banking, health care industry or government

Protecting privileged accounts … beyond the perimeter security

Protecting privileged accounts … beyond the perimeter security

  July 17, 2017 |  Firewalls, Malware and Ransomware Attacks

Perimeter security is receiving the utmost attention nowadays as advanced cyber threats originating from rogue state actors, hackers and cyber criminals targeting critical information

WannaCry attack: Time to shore up data and cyber security

WannaCry attack: Time to shore up data and cyber security

  June 01, 2017 |  Ransomware, Bitcoins, Data loss

The recent ransomware attack dubbed as WannaCry brings to the forefront one of the most recurrent challenges global organizations are confronting today: safeguarding business data from cyber crooks.

Indeed, as

Privileged Access Misuse: Four common mistakes firms make

Privileged Access Misuse: Four common mistakes firms make

  April 27, 2017 |  Critical Accounts, Authentication

Any modern-day enterprise’s information systems setup is not static. It grows as business expands. And as business goes through a transition period amidst rising amount of workloads shifting to cloud, the

Are datacenters fortified to prevent the misuse of shared privileged accounts?

How secured are you against data extrusion threat?

  April 18, 2017 |  BYOD, Data Breach, Identity Thefts

Having at the forefront of information risk management industry for more than a decade now, we have observed that enterprises remain most vulnerable in protecting their highly critical asset—data. Our

Are datacenters fortified to prevent the misuse of shared privileged accounts?

Are datacenters fortified to pevent the misuse of shared privileged accounts?

  February 27, 2017 |  Privileged Login Credentials, Datacenter, Biometrics

Amidst rising threat of cyber crime, enterprises today maintain datacenters with more robust security measures. To thwart and detect advanced

How malicious activities around privileged accounts go undetected?

How malicious activities around privileged accounts go undetected?

  February 17, 2017 |  Privilege Misuse, Database Layers, Identity and Access control

Structuring IT infrastructure in multiple layers of devices and applications brings many benefits.
As we discussed earlier, multiple layers of devices allow

How multiple IT set-up layers compromise privileged accounts?

How multiple IT set-up layers compromise privileged accounts?

  February 14, 2017 |  Root Accounts, Administrative Logins

In this digital age, data is the most valued asset for organizations. What we observe today is a quantum leap forward in the way organizations collate and manage data to comprehend business and

Are Fintech startups prepared to endure cyber risks?

Are Fintech startups prepared to endure cyber risks?

  February 10, 2017 |  Digital Payment Gateways, Regulatory Compliance

Probably the only startup fad that came any near to match present-day thrill surrounding the Fintech startup scene waswitnessed at the end of last decade when young motivated engineering and MBA grads presented exciting

Do you have a security net for Privileged accounts?

Do you have a security net for Privileged Accounts?

  February 03, 2017 |  Privileged Credentials, Insider Threats

Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of vital information (data) to stay ahead of the

Be mindful of your online footprints

Be mindful of your online footprints

  January 29, 2017 | Browsing pattern, Algorithms, Big Data

Those powerful sets of algorithms coded by search engine and social media giants have made human interaction on internet more purposeful and fruitful. Plan a holiday in  remote foothills of Himalayas or sunny beaches in Spain or surf online any popular

Slack cyber security readiness can bloat insurance policies

Slack cyber security readiness can bloat insurance policies

  January 16, 2017 | Cyber Insurance, DOS

That a failure to prevent cyber-attack can destabilize a business has led global CIOs and CISOs to up the ante against ever looming cybercrime in the last couple of years amidst a spate of highly sophisticated

Are you monitoring user behavior?

Are you monitoring user behavior?

  January 10, 2017 | Biometrics, Access Authentication

The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from cyber crook hacking a baby monitor to Mark Zuckerberg falling prey

Cyber Security Policies.jpg

Cyber Vulnerability: Five Common Mistakes Firms Make

  December 06, 2016 | Data Backup, Phishing, Malware

Notwithstanding big IT security budgets, global organizations are up to a big challenge. Incidents of hacking and data breaches surface far too often, undermining growing cyber vulnerabilities of companies.

From startups to

IPhone Vulnerability

Cashless Transactions: Great concept but are we prepared?

  November 29, 2016 | Demonetization, Access Authentication, Mobile Wallets

On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the circulation.

The decision is seen as a major crackdown on

Rising cyber thefts underscore banks

Datacenter: Maintain it like a fort

  November 16, 2016 | Datacenter, Sandboxing, Intrusion Detection System

Since prehistoric times, forts have a special significance in our lives. From medieval castles in Scotland to ancients forts built by Greeks, Romans, pre-independence princely states of India, and Egyptians-- these garrisons have played a crucial

Rising cyber thefts underscore banks

Rising cyber thefts underscore banks’ fragile online defenses

  November 9, 2016 | Computer Systems, Identity & Access Control

Typically, a bank’s customers throng in front of its gates when they fear that their hard-earned money might get disappeared due to financial institution’s irregularities. On so many occasions, as recently as the EU

Thefts of Digital Assets is Spiraling

Thefts of Digital Assets are Spiraling

  November 6, 2016 | Digital Assets, Privileged Identities

In an increasingly digitized business world,organizations are now measured by their ability to maintain a digital trust among investors, customers, and other stakeholders.

As discussed in our previous article ‘

Data Vulnerability

Data Security: Where global organizations err

  November 4, 2016 | Firewall, Data Detection Systems, Secure Configuration

As global firms grapple with increased cybercrimes, compliance managers are paying more heed to cyber security, especially the data.

Organizations now follow a strong IT security and governance policy, leading to more investments on

Identify Data breach

Is your Firm Prepared to Identify Data breach?

  October 19, 2016 | Identify Thefts, Data Security, Malicious Insider

Data Breach-- one of those excruciating costs which are keeping compliance managers and top managements on tenterhooks--is preventable, if firms possess necessary tools to identify malicious attempts to steal information, at the right

Failed M and A Deal

Compromised Digital Security Can Break Business Deals

  October 17, 2016 | Digital Security, Identity & Access Control Management

In an ever-expanding and integrated global economy, firms get assessed by their ability to adapt to changing dynamics in the business landscape.

Investors look at how fast and effectively firms innovate to grow—organically or

Blockchain Technology

Blockchain Technology: Is it completely foolproof?

  October 13, 2016 | Blockchain Technology, Algorithm Trading

Speed and efficiency are two of the most important cornerstones of the financial industry. To execute transactions at brisk pace while harvesting innumerable amount of data— financial companies from time to time adopt disruptive technologies to

Payment Networks

Online Payments: Pluck Those Low-Hanging Fruits

  October 12, 2016 | Payment Networks, Online Banking Apps

Breakthrough in online payments has significantly reduced complexities as a host of payment networks allow us to conveniently transfer payments-- anywhere and anytime.

But one big concern

Telecom Industry

How Telecom Companies can better Manage Risks

  October 02, 2016 | Telecom, Regulators, Compliance

About a year ago, a high-profile hacking incident at the U.K’s leading telecom operator Talk Talk, brought to the forefront many cyber security challenges faced by telecom companies across the world.

The company, which suffered breach of personal and financial

Rio Olympics Athletes Health Data Leaks

WADA Data Breach Lesson: Prioritize IT Spending

  September 30, 2016 | Cyber Assaults, Rio Olympics

Earlier in June, just about a month ago before the Reo Olympics, organizers had one big concern: How to boost cyber-defenses at a time when cybercriminals are becoming increasingly adept in bringing down IT systems during major

Social Media

Small Mistakes can erode Social Media’s Amazing Influence

  September 28, 2016 | Social Media, Data Breach, Passwords

Social Media: who would have thought about a decade ago thata host of websites and applications that allow social networking, will become a core part of our daily life?

Indeed, from running all sorts of promotional campaigns to familiarizing

cloud computing

As Firms Switch To Hybrid IT Environment, Data Security Will Need a Closer Look

  September 26, 2016 | Hybrid IT Environment, Data Breach, Privileged Identities

Disruptive technologies such as cloud computing offer many advantages to organizations. As the technology allows to store data in cloud service providers’ servers, it helps firms to cut IT-related

Secured Data

Have You Secured Those Master Keys to Your IT Network?

  September 15, 2016 | Privileged Access, Data Security, Data Breach

Data breaches continued to haunt corporations across the world. From Japan’s largest travel agency to UK’s leading accounting software firm and from America’s prominent hospital chain to Africa’s emerging financial institutions, organizations spanning

Fraudulent Money Transfer

This Lurking Threat for Banks from Cyberspace Needs Urgent Response

  September 12, 2016 | Cyber Heist, Financial Institutions, Privileged Accounts

The $ 101 million cyber heist at the Central Bank of Bangladesh, earlier this

IPhone Vulnerability

Cost of a Data Breach: Losing Trust, Reputation & Productivity

  September 07, 2016 | Unauthorized Access, Insider, Identity & Access Control

Malicious insider yet again played a key role behind a data breach. Last month a well-known British accounting Software firm suffered a

IPhone Vulnerability

IPhone Vulnerability: What the Incident Taught Us?

  September 06, 2016 | IPhone, iOS, Security Updates

Cyber security is one of the biggest challenges for global organizations. Equipped with advanced tools, cyber criminals are increasingly targeting firms’ IT systems, which in spite of higher infrastructure budgeting, remain vulnerable even at the slightest of

Cyber Vulnerability Compliance

Cyber Security Compliance: Are Compliance Managers and Managements on the Same Page?

  September 02, 2016 | Data Exfiltration, Compliance, Cyber Security, Risk

The topmost risk that today organizations share across all geographies is the threat emanating from cyberspace. While there is no denying of the fact that innumerable

Vital Infrastructure

Attacks on Vital Infrastructure: Are Nations Prepared to Avert Catastrophes?

  September 01, 2016 | Critical Infrastructure, Digital War, Cyber Vulnerability

Information technology has significantly transformed the world. Today, it plays a big part in our lives, allowing us to streamline our everyday activities. It also has a significant role in nation-building.

Malwares in Your Mobile Phones

These Malwares in Your Mobile Phones Can Drain Bank Accounts

  August 31 2016 | Biometrics, Malicious Software, Access Control

In one of our previous articles in this section, we discussed how financial institutions are grappling with growing incidents of identity thefts and data breaches. Citing the example of the U.S., where a series of breaches involving

Cyber Espionage

How Much Secured Are You in the Age of Digital War?

  August 29, 2016 | Cyber Espionage, Cyber Security

Rummage into some of the past factual tales of spy agencies then you will realize how the world of espionage is chockfull with intriguing, incredible, but terrifying acts. From the CIA to KGB and from Mossad to MI6, the secret dark world of espionage resulted in

Drone Security

Ever Thought Drones Could Unleash Cyber Attacks?

  August 25, 2016 | Drones, Cyber Espionage, Data

Protecting highly-classified data has become one of the biggest challenges for organizations across the world, particularly in the era of ‘big

Computerized Mining

Future of Automated Mining: Efficient but at Risk

  August 24, 2016 | Supercomputers, Conveyor Belts, Artificial Intelligence

Necessity is the mother of invention so goes the saying. It could not hold truer for any other industry than the mining business. Hard pressed by a prolonged period of depressed commodity prices, the industry is finding creative ways to

Cyber Security Policies

Do You Have a Cyber Security Policy in Place?

  August 22, 2016 | Identity Thefts, Secured Configuration, Big Data

Investments on New Technologies is Fine but Risks Mitigation Policy Equally Vital

Hacking of

Password Hacking

Are Your Business Emails Secured?

  August 19, 2016 | Scam-Emails, Cyber-Frauds, Hacking, Secured Configuration, Identity and Access Control, Servers

Fraudsters are now increasingly targeting business emails. According to FBI data, more than 22,000 businesses -- small and big-sized-- got targeted through dubious emails between October 2013 and

Cyber Attacks

Geopolitical Tensions Can Now Spill Over into Cyberspace

  August 18, 2016 | Cyber Warfare, Denial-of-Service (DOS), Cybersecurity, Malicious Software, South China Sea, Cyberspace

Geopolitical tensions have turned into a one of the biggest sources of cross-border cyber-assaults. Indeed, as nations collide over prolonged simmering bilateral or multilateral disputes, the

Cyber Attacks

Identity Thefts a Prime Concern but DOS Attacks Equally Damaging

  August 17, 2016 | Denial-of-Service (DOS), Identity Thefts, Cyber-Heist, Access Control, Secured Configuration

Cyber-frauds such as identity thefts and financial data breaches continued to damage global corporations this year despite increased IT security budgets. Poor

Wearable Fitness Devices

Wearable Fitness Devices: Tab on Health but Vulnerable to Hacking

  August 16, 2016 | Wearable Fitness Devices, Database, Data Privacy, Hacking, Risks

Who would have thought about a decade ago that watches and wrist-bands could help us keeping fit and healthy? But then the technology in our age is advancing at a lightning speed, churning out amazing

Machine Learning Algorithm

Don’t Compromise on Security for Convenience

  August 10, 2016 | Identity Thefts, IT Security, Hacking, Bitcoin, Passwords Keys, Cyber Attacks, Cyber Frauds 

Recent hacking at the Bitfinex Exchange raise questions over how we manage our vital information

Despite companies spending billions of dollars on

Machine Learning Algorithm

Trading Algorithms: Fast and Cost Effective but Extremely Vulnerable

  August 09, 2016 | Algorithms, Hacking, Vulnerability, Malicious Insiders,  Artificial Intelligence

Trading algorithms or “algos”, the highly advanced, automated, but complex tools, allow modern-day asset managers, individual traders to find highly lucrative trading opportunities by

Big Data

Poor Cybercrime Prosecution Rate Can Stifle IT Growth

  August 08, 2016 | Cybercrime, Prosecution Rate, Identity Thefts, Financial Data Breach, Cybersecurity Regulations, Access Control

As businesses across the world grapple with growing incidents of identity thefts, financial data breaches, and other forms of cybercrimes, governments and central banks are

Big Data

The Quagmire of ‘Big Data’

  August 05, 2016 | Data, Big Data, Identity Thefts, Insiders, Data Security, Malicious Insiders

Gaining competitive advantage over business rivals remains as the topmost concern for any business. To do this, organizations ceaselessly work to improve all business areas. Bringing new products into the market, driving innovation in

Unmanned Automated Fighter Planes

Why Risks Loom Over Despite Deploying Security Measures

  August 04, 2016 | Security, Sandboxing, Encryption, Firewall, Insider Threat, Cyberspace, Data

Organizations usually have a tendency to safeguard IT systems against external vulnerabilities but often insider threats are overlooked.

Very often IT security product developers

Unmanned Automated Fighter Planes

Will Unmanned Automated Fighter Planes be Vulnerable?

August 02, 2016 | Avionics, Unmanned Automated Fighter Planes, Algorithm

Avionics engineering has evolved a long way. From presumably the first-ever German fighter plane  Messerschmitt Me 262, dubbed as Schwalbe, which performed roles like light bombing and

Pokemon Go

Your Favorite Smartphone Game Downloads are Not Safe

July 29, 2016 | Augmented Reality, Personal Data, Security

Augmented reality (AR) smartphone game, Pokémon Go, got launched in several markets few days ago. The game turned out as an instant hit everywhere. The number of downloads of Pokémon Go game in first few days after the launch, easily surpassed

Aviation Industry

Compromised Privileged Identities can ‘Land’ Airline Companies in Trouble

July 27, 2016 | Privileged Identities, Cyber Security, Cyber Threats

Ever-expanding cyberspace amid increasing digitization of businesses boosted global trade, commerce, and innovation; risks and vulnerabilities, however, also increased due to Cyber-frauds.

US elections

Increasing Cyber-Threats to Drug-Makers

July 26, 2016 | Cyber-Threats, Risks, Data Breach, Cyber Security

No other industry is more vulnerable to risks and uncertainties than drug-makers. It takes years for drug-makers to develop a new treatment. These companies pour-in millions of dollars to discover new molecules that could help

US elections

U.S. Presidential Elections: What Email Leaks Point to?

July 25, 2016 | Hacktivists, Privileged Accounts, Data Leaks, Vulnerable Access

A spate of email leaks during a run-up to the US Presidential elections has left Democrats hiding for a cover; but it also shows how critical information is always vulnerable to hacking.

cyberlaws

ASEAN Integration: Governments Should Pay More Heed to Cyber Security Regulations

July 21, 2016 | Cyber Security, Regulation, ASEAN

Britain’s decision to leave the European Union (EU) last month left many dumbfounded. It rattled markets; and, unnerved the global market sentiment. That decision, however, failed to influence the Association of

Artificial Intelligence

Artificial Intelligence: Incredible Possibilities but Devastating Risks

July 20, 2016 | Artificial Intelligence, Risks, Security

Our experience of Artificial Intelligence (AI), in general, is limited to Hollywood movies, wherein robots working on AI performs

Password Management

Data Breach: Adapting to Biometrics is Only the Half Job Done

July 18, 2016 | Biometric Access, Identity Theft, Privileged Identity/Access Management

Identity theft remains one of the biggest concerns for banking institutions across the world. The number of data breach incidents have jumped manifold as cybercriminals now have advanced

Secured Financial Transactions

SWIFT’s Decision to Hire Cybersecurity Firms is Step in a Right Direction; but Banks Need to Do More

July 15, 2016 | Privileged Identities, IT Security, Privileged Access Management, Security Breach

Earlier this week, the world’s biggest money-transfer system, Society for the Worldwide Interbank

Perils of 3D Printing Technology

Perils of 3D Printing Technology

July 13, 2016 | 3D Printing, Computer Assisted Design

Cost, quality, and efficiency, these are the key metrics that any organization--be it a manufacturing company, financial institution or a service agency-- strives to improve, relentlessly. A sound operations management forms the basis of a fundamental

Increasing Digitalized African Economy Need a Closer Look at IT Security

Increasing Digitalized African Economy Need a Closer Look at IT Security

July 12, 2016 | Privileged Access Management, Identity-Theft, Intellectual Property

The African economy has been through an amazing transition in the recent years as a rapid digitalization of

autonomous-technology

Autonomous Vehicles: Have Manufacturers Addressed All Safety Concerns?

July 11, 2016 | Autonomous Vehicles, Hacking

Probably the two most talked about topics in the world of emerging technology are autonomous vehicles and the internet of things. Amid its ever rising popularity, intelligent technology is expected to

cyberlaws

Data Breach: Stolen Sensitive Data is a New Commodity

   July 05, 2016   |   Data Breach, Privilege Misuse

As cybercriminals turn more technology savvy, possessing necessary tools and competence to breach your IT security systems, businesses across the world, are facing a grave challenge, which is to protect sensitive data from hackers.

 Organized cybercriminals, rogue hackers, and

cyberlaws

The Internet of Things: Puts You at Ease but with Risks

   July 04, 2016   |   Internet of Things, Denial-of-Services

Disruptive technologies such as cloud computing, and the internet of things have made our lives at ease, efficient, exciting, and above all, it has spurred innovation. Think about the Internet of Things (IOT). Young tech

cyberlaws

Will the Recent Unfolding of Events in the EU Impact Indian Software Firms?

   July 01, 2016   |    Business Uncertainty, Software

As the dust settles down after a mayhem sparked off by the shocking referendum outcome in Britain, we look at whether the Indian software firms could feel the impact in the near to middle

cyberlaws

Will China Enforce Tougher Cyber security Laws?

   June 30, 2016   |   Cybersecurity Regulations, Cyberspace, GRC, User Data

China, the world’s second largest economy, and home to some globally renowned technology companies, ironically, remains as one of the most standoffish country when it comes allowing access to

cyberlaws

Rio Olympics: Threats from “Hacktivists” and Organized Cybercriminals

   June 29, 2016   |   Cyber-defenses, Cloud, Cyberattacks, Hacktivists

However, one of the most daunting tasks for organizers nowadays is to ensure cyber-defenses is up to the mark.  

Come August 5, Brazil’s lively city, Rio de Janeiro will be hosting Olympics 2016. Millions of people from

cyberlaws

Insider Threats to Critical IT Assets is on the Rise

   July 05, 2016   |   Privileged Access Management, Insider Threat, Data-Breach

Data-breach incidents nowadays have not just become far too rampant but the losses arising out of those attacks have also risen sharply. A recent annual Cost of Data Breach Study commissioned by IBM and

cyberlaws

How Britain’s Decision to Leave the EU can Affect Cybersecurity Market

   June 27, 2016   |   Cyber Security, Risk, Cyber Threats

As Britain faces a glaring reality of its disintegrating influence in the global arena following a shocking poll outcome which saw a majority of Britons preferring to leave the European Union, we take a quick look at how the decision could

Japan-Olympics

Japan Looks to Fortify IT Systems as it Prepares for Possible Cyberattacks in Olympics 2020

   June 27, 2016   |   IT Systems, Cyber Attacks, Privileged Access Management

There was a time when Japan was relatively immune to cyberattacks. Indeed, in 2013, Asia’s second largest economy reported 310 million cyberattacks—a not so high number of attacks considering its

Brexit

Brexit Rattles Global Markets, Impending Uncertainties and Risks for Britain and the EU

   June 24, 2016   |   Brexit, Cyber Attacks, Global Markets

As widely feared, Britons have decided to leave the European Union (EU). In a closely

bitcoin

Regulators Warn Bitcoin can ‘Potentially Create Financial Stability Risk’

   June 22, 2016   |   Risk, Bitcoin, Cyber Crime

Bitcoin, a cyber-currency, has received some flak from the influential circles in the US amidst its growing popularity.

US regulators, which include, The Treasury Department, the Federal Reserve and the Securities and Exchange

Risksinin-Case-of-Brexit

Possible Risks in Case of a #Brexit

   June 22, 2016   |   #Brexit, Risk, IT assets,IT security

Ahead of the crucial referendum on #Brexit, which will be held on Thursday June 23rd, Britain, including global market participants, remain edgy.

There is a growing curiosity over whether Britain will or will not choose to remain within the European Union, and more importantly,

About ARCON

Product In Action

Follow us

        

Keep in Touch

   This email address is being protected from spambots. You need JavaScript enabled to view it.
+91 22 4221 5300  (INDIA)  
+97143633637 / +971507080970  (MIDDLE EAST)  
  (212)-537-6519   (USA)  
  +61- (02)8006-1236   (Australia)  

   Get Directions