Cyber Criminals Target Data, not Industry
August 09, 2019 | Data Breach, Cyber Threats, Dark Web
Today, data breach incidents have become common news headlines across the globe. A layman’s psychological traits drive the idea of any data breach incident towards financial institutions. According to the trends and our findings, we come
Protecting Passwords: The key to securely lock enterprise digital assets
August 02, 2019 | Privileged Credentials, Password Vaulting
A few months back, Facebook, the social media giant, acquired the headlines of cyber security news due to poor password management. Millions of users’ private credentials were
Are Government Organizations Ready to Tackle Cyber Warfare?
July 26, 2019 | Cyber Warfare, Cyber Espionage, Governments
Government data of any nation across the globe is a gold mine for hackers. This data normally consists of sensitive information and strategic blueprints including
Strengthen Compliance Framework to Avoid Hefty Regulatory Fines
July 22, 2019 | Compliance, GDPR, Privileged Access
British Airways has been slapped with a record fine of lump sum £183m for last year's information breach of 380,000 customers. This aviation giant has already
This Massive Information Breach should be an Eye-Opener
July 12, 2019 | Data Breach, Privileged Identities
The National Aeronautics and Space Administration (NASA) must have been embarrassed to be in the news of being a victim of data breach. However, the fact is, this “unexpected” incident has reminded the cyber world
Half-baked Measures to control Privileged Access can Jeopardize IT Infra
July 05, 2019 | Privileged Accounts, SSO
ARCON recently came across a very interesting use case. Our pre-sales team was asked by one of the leading manufacturing organizations to provide a demo to understand the benefits of ARCON
Track Privileged Accounts to Avoid Catastrophe
June 07, 2019 | Cloud Computing, Auto-discovery
The advancement in information technology has brought forth boon on one hand and bane on the other. While technology advancements like cloud computing and big data have created IT operational efficiencies, a large pool of data created out
Is your organization controlling access to critical systems?
May 24, 2019 | Granular, Access Control
In the wake of numerous incidents involving abuse of privileged credentials and data breach, organizations are looking for more robust technology that could monitor privileged user activities in real-time and at
How robust is your Password Management?
April 26, 2019 | Password, User Data
Do we ever forget or share security numbers of our safety lockers in banks where we keep our precious and valuable items for security? Or do we ever share ATM pins or internet banking credentials with anyone? Then why can’t we keep the same habit
IOTs: Serious cyber risks but we can secure those
Feb 22, 2019 | IOT, Cyber Defense
IoT (Internet of Things) has made our lives comfortable, easy, smart, exciting and it has spurred innovation too. The boom of IoT in the recent past is expected to have a huge amount of monetary involvement that can
Protecting health information: Time to be proactive not reactive
Feb 08, 2019 | GDPR, HIPPA
More than a week back, Singapore National Public Health Authority revealed that almost 14,000 health records of people from Singapore and other foreign nationals were compromised and leaked online.
The Importance of Privileged Access Management knows no bounds
Feb 01, 2019 | Access Management, Data Security
A young man named Sumit joined an organization as a junior sales associate. The company allotted him a laptop for his daily work activities. Sumit found that the laptop was used by the
Privileged Access Management: A Remedy for Data Security
Dec 24, 2018 | Digital Identities, Insider Threats
There was a recent data breach incident in one of the global E-commerce giants. Immediately after the news turned epidemic, the management dished out the queries and criticism and
Secure Passwords, Save your Digital Assets
Dec 14, 2018 | Password Vault, Digital Data
Who can forget the infamous data breach incident of one of the popular file hosting service providers where more than 60 million users’ email addresses and passwords got affected? An employee just reused a password at work and
Role of PAM in meeting Regulatory Compliance
Dec 03, 2018 | Password Management , Password Vault
Facebook could face penalties worth in billions under GDPR (General Data Protection Act) compliance act for not following the basic policies. It happened because more than 50 million accounts were compromised due to
How to mitigate misuse of Privileged Accounts
Nov 16, 2018 | Password Management , Password Vault
Misuse of privileged accounts is one of the burning threats for enterprises today. The detection process is time-consuming. Even if the organizations try to calculate the amount of loss
Healthcare Industry: Time to reinforce privileged access control
Oct 24, 2018 | Healthcare , Authentication
IT security awareness has become a crying need for the CIOs, CISOs and CTOs of global enterprises. After BFSI, Government, Manufacturing, IT and Pharmaceuticals industry, now Healthcare industry
Proper Password Management: A big concern till today
Oct 9, 2018 | Privileged accounts , Password Policy
A recent audit on Western Australian Government has revealed that almost 1500 employees are using same password for more than six thousand five hundred accounts. From the point of view of data security, this news has
Alarming Rise of Privileged Account Breaches
Sep 19, 2018 | Cyber Security , Malicious Activitied
Digital security breaches happening globally have not spared any industry from its fangs. These breach incidents mostly take place with the help of external malefactors or malicious insiders. The ever-existing
Data Breach Prevention: Focus of Modern Business Entrepreneurs
Aug 24, 2018 | Digital Threats , Access Management
It has become quite rare today that we are not coming across any news of data breach incident irrespective of small or large organizations. This has forced the new and young entrepreneurs to take adequate preventive measures rather than paying
University Students’ Data are at stake
Aug 20, 2018 | Privileged Accounts , Authentication
It is definitely unruly and obnoxious to learn that the cyber crooks are not sparing education sector from their target zone. Few months back, some unethical hackers (suspected to be from Iran) made an alleged spree of malicious attacks
Data Theft: Still a Major Concern
July 19, 2018 | User Credentials , Sensitive Data
As more than one hundred Government websites were compromised between April 2017 to January 2018, another hair-raising incident of Provident Fund portal hack in April 2018, has put the data of 2.7 crore people at stake. With this, the revolutionary
Is your enterprise security compliant?
July 12, 2018 | Compliance, Data Policy
With mandatory GDPR (General Data Protection Regulation) and PCI DSS (Payment Card Industry Data Security Standard) compliances already making its way to protect the personal data and digital assets of late, any kind of non-compliance could cost
Malicious Insider: Tame your Worry
July 05, 2018 | Insider threats, Data Security
Historically and traditionally, outsiders pose bigger threats to organizations as far as data security is concerned. However, of late, it has been a subject of debate where many security professionals are of the opinion that insiders pose bigger threats to modern
Identity and Access Control: Must for Digitization
June 25, 2018 | BYOD, Passwords, Identity Breaches
The global digital workspace is expanding at rapid pace and by 2020 most of the organizations would take the path of digitization worldwide. Simultaneously, types of security breaches are getting
Is your fitness app secure?
June 20, 2018 | Authetication, Lifestyle, Identities
While Oliver was jogging down the track and took a halt to adjust his snickers, little did he knew that the fitness app he installed in his smartphone to monitor his heartbeat is being accessed by some malefactor unlawfully. This has happened to
The awakening of IT security boom in Africa
June 13, 2018 | IOT, Access Control, Cyber Incidents
The abundance of cloud computing, Artificial Intelligence (AI) and Internet of Things (IoT)are driving massive growth in IT opportunities in Africa off late. The IT sector in South Africa is expected to reach R175 billion by
Email Compromise Scam hits hard in Aussie real estate
June 11, 2018 | real estate sector, User Data
During the end of 2017 in Australia, cybercriminals started to target the real estate sector which is considered as a comparatively weak industry in terms of IT security.
According to a
Smart City: Are we secured?
June 06, 2018 | digital security, Artificial Intelligence
With the advent of AI (Artificial Intelligence) and IoT (Internet of Things), technological advancements are reaching a different high to offer newer comfort to mankind. The latest and brightest inclusion is Smart City, which is ready to change the definition of
Access Control: A Must for Government organizations
May 14, 2018 | User Data, Digitization
A couple of months back there was a piece of news flashing in Indian channels that Aadhar details of uncountable citizens have been compromised badly. Fortunately, that turned out to be a rumour and
Evade these fatal Data Security blunders at any cost
April 18, 2018 | Authentication, Data Threat
With the impending execution of GDPR (General Data Protection Regulation), any potentially wrong data security decisions could lead to disastrous consequences for your business. Let us peruse some common data security mistakes that should be
Is your organization GDPR compliant?
February 22, 2018 | compliance, Audit
The compliance landscape with regard to data security is getting more and more stringent. Come May 2018, the General Data Protection Regulation (GDPR) comes into an effect. The regulation would make it mandatory for organizations-- doesn’t matter large or
Privileged accounts security: Addressing the most common pain point for an enterprise
February 16, 2018 | Corporate Confidential , Data Breach
Organizations , in order to scale up operations and boost efficiency, have been adapting to newer technologies. The pace at which modern day enterprise is streamlining IT
Managing Privileged Accounts to fulfill compliance requirements
February 08, 2018 | Compliance, Policies
The legal framework supporting cyber security is becoming increasingly stringent as modern day enterprises turn more digitized. Indeed, while digitization of business boosts operational efficiency, it also
How Secure is your Data in Managed Service Environment?
February 02, 2018 | Business Risk, MSP
Innovation in technology is yielding significant results. Enterprises are gaining efficiency, operational flexibility along with cost reduction as cloud and Managed Service Provider (MSP) provides an alternative service space.
Data: Identifying threats
November 14, 2017 | Network Security, User Monitoring
Technology advancement has enabled organizations to gain efficiencies especially with respect to storing and processing data. Since there are multiple resources to store data, its security management is a big challenge. Indeed, what makes data vulnerable is its
Why enterprises need behavior analytics?
October 25, 2017 | Network Security, User Monitoring
Modern day organizations face recurrent risks from cyber space. Information systems, as witnessed during the recent wave of advanced ransomware attacks, can be thrown out of gear, if the underlying security is not up to the
Revisiting security framework
October 08, 2017 | information assets, Cyber incidents
When one of the world’s biggest internet companies reported a series of hacks that compromised confidentiality of hundreds of millions of users, it gave a sober warning to cyber community: organizations irrespective of their sizes are extremely vulnerable to
Protecting data in IOT era
September 06, 2017 | Digital revolution, Vulnerabilities
To add value proposition and boost productivity for business, organizations have been transforming their day-to-day operations by investing more on the internet of things (IOTs).
Microprocessors and sensors connected to the internet add immense value to
Is your organization equipped for timely detection?
August 23, 2017 | Data breach, Session monitoring
Theft or misuse of critical information assets from compromised insiders, in most cases, occurs as organizations fail to timely detect unusual or suspicious activities around privileged accounts— gateway to highly
Why it is essential to build resilience around privileged accounts?
August 16, 2017 | User behavior analytics, Access authorization
Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder, keeping our home safe and secure is always of utmost importance for
From emails to admin passwords leaks: rising vulnerability of media companies
August 09, 2017 | Passwords Leaks, Cyber Crooks
Sophisticated cyber-attacks aimed at stealing confidential data and disabling IT systems are not just confined to banking, health care industry or government
Protecting privileged accounts … beyond the perimeter security
July 17, 2017 | Firewalls, Malware and Ransomware Attacks
Perimeter security is receiving the utmost attention nowadays as advanced cyber threats originating from rogue state actors, hackers and cyber criminals targeting critical information
WannaCry attack: Time to shore up data and cyber security
June 01, 2017 | Ransomware, Bitcoins, Data loss
The recent ransomware attack dubbed as WannaCry brings to the forefront one of the most recurrent challenges global organizations are confronting today: safeguarding business data from cyber crooks.
Privileged Access Misuse: Four common mistakes firms make
April 27, 2017 | Critical Accounts, Authentication
Any modern-day enterprise’s information systems setup is not static. It grows as business expands. And as business goes through a transition period amidst rising amount of workloads shifting to cloud, the
How secured are you against data extrusion threat?
April 18, 2017 | BYOD, Data Breach, Identity Thefts
Having at the forefront of information risk management industry for more than a decade now, we have observed that enterprises remain most vulnerable in protecting their highly critical asset—data. Our
Are datacenters fortified to pevent the misuse of shared privileged accounts?
February 27, 2017 | Privileged Login Credentials, Datacenter, Biometrics
Amidst rising threat of cyber crime, enterprises today maintain datacenters with more robust security measures. To thwart and detect advanced
How malicious activities around privileged accounts go undetected?
February 17, 2017 | Privilege Misuse, Database Layers, Identity and Access control
Structuring IT infrastructure in multiple layers of devices and applications brings many benefits.
As we discussed earlier, multiple layers of devices allow
How multiple IT set-up layers compromise privileged accounts?
February 14, 2017 | Root Accounts, Administrative Logins
In this digital age, data is the most valued asset for organizations. What we observe today is a quantum leap forward in the way organizations collate and manage data to comprehend business and
Are Fintech startups prepared to endure cyber risks?
February 10, 2017 | Digital Payment Gateways, Regulatory Compliance
Probably the only startup fad that came any near to match present-day thrill surrounding the Fintech startup scene waswitnessed at the end of last decade when young motivated engineering and MBA grads presented exciting
Do you have a security net for Privileged Accounts?
February 03, 2017 | Privileged Credentials, Insider Threats
Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of vital information (data) to stay ahead of the
Be mindful of your online footprints
January 29, 2017 | Browsing pattern, Algorithms, Big Data
Those powerful sets of algorithms coded by search engine and social media giants have made human interaction on internet more purposeful and fruitful. Plan a holiday in remote foothills of Himalayas or sunny beaches in Spain or surf online any popular
Slack cyber security readiness can bloat insurance policies
January 16, 2017 | Cyber Insurance, DOS
That a failure to prevent cyber-attack can destabilize a business has led global CIOs and CISOs to up the ante against ever looming cybercrime in the last couple of years amidst a spate of highly sophisticated
Are you monitoring user behavior?
January 10, 2017 | Biometrics, Access Authentication
The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from cyber crook hacking a baby monitor to Mark Zuckerberg falling prey
Cyber Vulnerability: Five Common Mistakes Firms Make
December 06, 2016 | Data Backup, Phishing, Malware
Notwithstanding big IT security budgets, global organizations are up to a big challenge. Incidents of hacking and data breaches surface far too often, undermining growing cyber vulnerabilities of companies.
From startups to
Cashless Transactions: Great concept but are we prepared?
November 29, 2016 | Demonetization, Access Authentication, Mobile Wallets
On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the circulation.
The decision is seen as a major crackdown on
Datacenter: Maintain it like a fort
November 16, 2016 | Datacenter, Sandboxing, Intrusion Detection System
Since prehistoric times, forts have a special significance in our lives. From medieval castles in Scotland to ancients forts built by Greeks, Romans, pre-independence princely states of India, and Egyptians-- these garrisons have played a crucial
Rising cyber thefts underscore banks’ fragile online defenses
November 9, 2016 | Computer Systems, Identity & Access Control
Typically, a bank’s customers throng in front of its gates when they fear that their hard-earned money might get disappeared due to financial institution’s irregularities. On so many occasions, as recently as the EU
Thefts of Digital Assets are Spiraling
November 6, 2016 | Digital Assets, Privileged Identities
In an increasingly digitized business world,organizations are now measured by their ability to maintain a digital trust among investors, customers, and other stakeholders.
Data Security: Where global organizations err
November 4, 2016 | Firewall, Data Detection Systems, Secure Configuration
As global firms grapple with increased cybercrimes, compliance managers are paying more heed to cyber security, especially the data.
Organizations now follow a strong IT security and governance policy, leading to more investments on
Is your Firm Prepared to Identify Data breach?
October 19, 2016 | Identify Thefts, Data Security, Malicious Insider
Data Breach-- one of those excruciating costs which are keeping compliance managers and top managements on tenterhooks--is preventable, if firms possess necessary tools to identify malicious attempts to steal information, at the right
Compromised Digital Security Can Break Business Deals
October 17, 2016 | Digital Security, Identity & Access Control Management
In an ever-expanding and integrated global economy, firms get assessed by their ability to adapt to changing dynamics in the business landscape.
Investors look at how fast and effectively firms innovate to grow—organically or
Blockchain Technology: Is it completely foolproof?
October 13, 2016 | Blockchain Technology, Algorithm Trading
Speed and efficiency are two of the most important cornerstones of the financial industry. To execute transactions at brisk pace while harvesting innumerable amount of data— financial companies from time to time adopt disruptive technologies to
Online Payments: Pluck Those Low-Hanging Fruits
October 12, 2016 | Payment Networks, Online Banking Apps
Breakthrough in online payments has significantly reduced complexities as a host of payment networks allow us to conveniently transfer payments-- anywhere and anytime.
But one big concern
How Telecom Companies can better Manage Risks
October 02, 2016 | Telecom, Regulators, Compliance
About a year ago, a high-profile hacking incident at the U.K’s leading telecom operator Talk Talk, brought to the forefront many cyber security challenges faced by telecom companies across the world.
The company, which suffered breach of personal and financial
WADA Data Breach Lesson: Prioritize IT Spending
September 30, 2016 | Cyber Assaults, Rio Olympics
Earlier in June, just about a month ago before the Reo Olympics, organizers had one big concern: How to boost cyber-defenses at a time when cybercriminals are becoming increasingly adept in bringing down IT systems during major
Small Mistakes can erode Social Media’s Amazing Influence
September 28, 2016 | Social Media, Data Breach, Passwords
Social Media: who would have thought about a decade ago thata host of websites and applications that allow social networking, will become a core part of our daily life?
Indeed, from running all sorts of promotional campaigns to familiarizing
As Firms Switch To Hybrid IT Environment, Data Security Will Need a Closer Look
September 26, 2016 | Hybrid IT Environment, Data Breach, Privileged Identities
Disruptive technologies such as cloud computing offer many advantages to organizations. As the technology allows to store data in cloud service providers’ servers, it helps firms to cut IT-related
Have You Secured Those Master Keys to Your IT Network?
September 15, 2016 | Privileged Access, Data Security, Data Breach
Data breaches continued to haunt corporations across the world. From Japan’s largest travel agency to UK’s leading accounting software firm and from America’s prominent hospital chain to Africa’s emerging financial institutions, organizations spanning
IPhone Vulnerability: What the Incident Taught Us?
September 06, 2016 | IPhone, iOS, Security Updates
Cyber security is one of the biggest challenges for global organizations. Equipped with advanced tools, cyber criminals are increasingly targeting firms’ IT systems, which in spite of higher infrastructure budgeting, remain vulnerable even at the slightest of
Cyber Security Compliance: Are Compliance Managers and Managements on the Same Page?
September 02, 2016 | Data Exfiltration, Compliance, Cyber Security, Risk
The topmost risk that today organizations share across all geographies is the threat emanating from cyberspace. While there is no denying of the fact that innumerable
Attacks on Vital Infrastructure: Are Nations Prepared to Avert Catastrophes?
September 01, 2016 | Critical Infrastructure, Digital War, Cyber Vulnerability
Information technology has significantly transformed the world. Today, it plays a big part in our lives, allowing us to streamline our everyday activities. It also has a significant role in nation-building.
These Malwares in Your Mobile Phones Can Drain Bank Accounts
August 31 2016 | Biometrics, Malicious Software, Access Control
In one of our previous articles in this section, we discussed how financial institutions are grappling with growing incidents of identity thefts and data breaches. Citing the example of the U.S., where a series of breaches involving
How Much Secured Are You in the Age of Digital War?
August 29, 2016 | Cyber Espionage, Cyber Security
Rummage into some of the past factual tales of spy agencies then you will realize how the world of espionage is chockfull with intriguing, incredible, but terrifying acts. From the CIA to KGB and from Mossad to MI6, the secret dark world of espionage resulted in
Future of Automated Mining: Efficient but at Risk
August 24, 2016 | Supercomputers, Conveyor Belts, Artificial Intelligence
Necessity is the mother of invention so goes the saying. It could not hold truer for any other industry than the mining business. Hard pressed by a prolonged period of depressed commodity prices, the industry is finding creative ways to
Are Your Business Emails Secured?
August 19, 2016 | Scam-Emails, Cyber-Frauds, Hacking, Secured Configuration, Identity and Access Control, Servers
Fraudsters are now increasingly targeting business emails. According to FBI data, more than 22,000 businesses -- small and big-sized-- got targeted through dubious emails between October 2013 and
Geopolitical Tensions Can Now Spill Over into Cyberspace
August 18, 2016 | Cyber Warfare, Denial-of-Service (DOS), Cybersecurity, Malicious Software, South China Sea, Cyberspace
Geopolitical tensions have turned into a one of the biggest sources of cross-border cyber-assaults. Indeed, as nations collide over prolonged simmering bilateral or multilateral disputes, the
Identity Thefts a Prime Concern but DOS Attacks Equally Damaging
August 17, 2016 | Denial-of-Service (DOS), Identity Thefts, Cyber-Heist, Access Control, Secured Configuration
Wearable Fitness Devices: Tab on Health but Vulnerable to Hacking
August 16, 2016 | Wearable Fitness Devices, Database, Data Privacy, Hacking, Risks
Who would have thought about a decade ago that watches and wrist-bands could help us keeping fit and healthy? But then the technology in our age is advancing at a lightning speed, churning out amazing
Don’t Compromise on Security for Convenience
August 10, 2016 | Identity Thefts, IT Security, Hacking, Bitcoin, Passwords Keys, Cyber Attacks, Cyber Frauds
Recent hacking at the Bitfinex Exchange raise questions over how we manage our vital information
Despite companies spending billions of dollars on
Trading Algorithms: Fast and Cost Effective but Extremely Vulnerable
August 09, 2016 | Algorithms, Hacking, Vulnerability, Malicious Insiders, Artificial Intelligence
Trading algorithms or “algos”, the highly advanced, automated, but complex tools, allow modern-day asset managers, individual traders to find highly lucrative trading opportunities by
Poor Cybercrime Prosecution Rate Can Stifle IT Growth
August 08, 2016 | Cybercrime, Prosecution Rate, Identity Thefts, Financial Data Breach, Cybersecurity Regulations, Access Control
As businesses across the world grapple with growing incidents of identity thefts, financial data breaches, and other forms of cybercrimes, governments and central banks are
The Quagmire of ‘Big Data’
August 05, 2016 | Data, Big Data, Identity Thefts, Insiders, Data Security, Malicious Insiders
Gaining competitive advantage over business rivals remains as the topmost concern for any business. To do this, organizations ceaselessly work to improve all business areas. Bringing new products into the market, driving innovation in
Why Risks Loom Over Despite Deploying Security Measures
August 04, 2016 | Security, Sandboxing, Encryption, Firewall, Insider Threat, Cyberspace, Data
Organizations usually have a tendency to safeguard IT systems against external vulnerabilities but often insider threats are overlooked.
Very often IT security product developers
Will Unmanned Automated Fighter Planes be Vulnerable?
August 02, 2016 | Avionics, Unmanned Automated Fighter Planes, Algorithm
Avionics engineering has evolved a long way. From presumably the first-ever German fighter plane Messerschmitt Me 262, dubbed as Schwalbe, which performed roles like light bombing and
Your Favorite Smartphone Game Downloads are Not Safe
July 29, 2016 | Augmented Reality, Personal Data, Security
Augmented reality (AR) smartphone game, Pokémon Go, got launched in several markets few days ago. The game turned out as an instant hit everywhere. The number of downloads of Pokémon Go game in first few days after the launch, easily surpassed
Compromised Privileged Identities can ‘Land’ Airline Companies in Trouble
July 27, 2016 | Privileged Identities, Cyber Security, Cyber Threats
Ever-expanding cyberspace amid increasing digitization of businesses boosted global trade, commerce, and innovation; risks and vulnerabilities, however, also increased due to Cyber-frauds.
Increasing Cyber-Threats to Drug-Makers
July 26, 2016 | Cyber-Threats, Risks, Data Breach, Cyber Security
No other industry is more vulnerable to risks and uncertainties than drug-makers. It takes years for drug-makers to develop a new treatment. These companies pour-in millions of dollars to discover new molecules that could help
U.S. Presidential Elections: What Email Leaks Point to?
July 25, 2016 | Hacktivists, Privileged Accounts, Data Leaks, Vulnerable Access
A spate of email leaks during a run-up to the US Presidential elections has left Democrats hiding for a cover; but it also shows how critical information is always vulnerable to hacking.
ASEAN Integration: Governments Should Pay More Heed to Cyber Security Regulations
July 21, 2016 | Cyber Security, Regulation, ASEAN
Britain’s decision to leave the European Union (EU) last month left many dumbfounded. It rattled markets; and, unnerved the global market sentiment. That decision, however, failed to influence the Association of
Artificial Intelligence: Incredible Possibilities but Devastating Risks
July 20, 2016 | Artificial Intelligence, Risks, Security
Our experience of Artificial Intelligence (AI), in general, is limited to Hollywood movies, wherein robots working on AI performs
Data Breach: Adapting to Biometrics is Only the Half Job Done
July 18, 2016 | Biometric Access, Identity Theft, Privileged Identity/Access Management
Identity theft remains one of the biggest concerns for banking institutions across the world. The number of data breach incidents have jumped manifold as cybercriminals now have advanced
SWIFT’s Decision to Hire Cybersecurity Firms is Step in a Right Direction; but Banks Need to Do More
July 15, 2016 | Privileged Identities, IT Security, Privileged Access Management, Security Breach
Earlier this week, the world’s biggest money-transfer system, Society for the Worldwide Interbank
Perils of 3D Printing Technology
July 13, 2016 | 3D Printing, Computer Assisted Design
Cost, quality, and efficiency, these are the key metrics that any organization--be it a manufacturing company, financial institution or a service agency-- strives to improve, relentlessly. A sound operations management forms the basis of a fundamental