Protecting Passwords: The key to securely lock enterprise digital assets

A few months back, Facebook, the social media giant, acquired the headlines of cyber security news due to poor password management. Millions of users’ private credentials were stored in plain text format which was revealed by a reporter in a security blog. Although Facebook has denied the privacy breach of those million users (many of […]

Cyber Criminals Target Data, not Industry

Today, data breach incidents have become common news headlines across the globe. A layman’s psychological traits drive the idea of any data breach incident towards financial institutions. According to the trends and our findings, we come across several instances where people estimate the common reason for any breach incident is to take hostage of confidential […]

Are Government Organizations Ready to Tackle Cyber Warfare?

Government data of any nation across the globe is a gold mine for hackers. This data normally consists of sensitive information and strategic blueprints including private public data containing name, age, date of birth, address, personal identification number or even passport number, registered mobile numbers and so forth. This data is highly lucrative for cyber […]

Strengthen Compliance Framework to Avoid Hefty Regulatory Fines

British Airways has been slapped with a record fine of lump sum £183m for last year’s information breach of 380,000 customers. This aviation giant has already met with an irrevocable reputation damage last year having confessed to a major information breach of thousands of passengers whose name, email address and credit card information (those who […]

This Massive Information Breach should be an Eye-Opener

The National Aeronautics and Space Administration (NASA) must have been embarrassed to be in the news of being a victim of data breach. However, the fact is, this “unexpected” incident has reminded the cyber world that there is no organization in the world which is foolproof against cyber-crime. Moreover, it has also brought to the […]

Half-baked Measures to control Privileged Access can Jeopardize IT Infra

ARCON recently came across a very interesting use case. Our pre-sales team was asked by one of the leading manufacturing organizations to provide a demo to understand the benefits of ARCON Privileged Access Management as its IT risk control team wanted to reinforce privileged access control for security purposes. Following a demo, the IT risk […]

Track Privileged Accounts to Avoid Catastrophe

The advancement in information technology has brought forth boon on one hand and bane on the other. While technology advancements like cloud computing and big data have created IT operational efficiencies, a large pool of data created out of it has resulted in security vulnerabilities. It is a challenge for IT pros of a typical […]

Is your organization controlling access to critical systems?

In the wake of numerous incidents involving abuse of privileged credentials and data breach, organizations are looking for more robust technology that could monitor privileged user activities in real-time and at the same time protect the critical business information from malicious actors. While robust validation mechanism helps in building the foundation for best privileged practices, […]

Reinforcing Information Security – Need of the hour in Africa

Threat Landscape One of the major news channels of South Africa suffered massive data breach compromising data of 60 million users (mostly South African citizens) during March 2017. This is considered to be the largest data breach incident in the history of South Africa. Once the hacking news spread like wildfire among the cyber security […]

How robust is your Password Management?

Do we ever forget or share security numbers of our safety lockers in banks where we keep our precious and valuable items for security? Or do we ever share ATM pins or internet banking credentials with anyone? Then why can’t we keep the same habit for securing digital identities? We come across numerous stray incidents […]

Request A Demo

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.

Become A Partner

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.