Unauthorized Access: It’s not just about databases

Overview A recent report by The Economic Times (CISO) revealed that more than 600 twitter accounts, emails and websites pertaining to the government of India were compromised in the last five years. CERT-In, the official government body that notifies the affected entities along with remedies, have also confirmed these shocking statistics. The ‘Digital India’ drive, […]
Data Security: A Never-ending Concern

It is not a bank, a government entity or a healthcare organization! This time the cyber crooks strike hard on the entertainment industry! Recently, a USA-based vendor that designs graphics processing units for the gaming and professional markets suffered a compromise of emails of more than seventy thousand employees. Can there be anything worse? The […]
Alarming Gap in Response to Data Security

A recent study suggests that a good number of Indian organizations are showing a lackadaisical attitude towards data security norms and initiatives. Whether it is personal identifiable data or electronic health records, most of the organizations are lacking cyber risk management strategies that ensure data security. About 60% of Indian organizations surveyed are not sure […]
Keeping Supply Chains Secure in a Digitalized world

As the tension mounts due to the ongoing conflict between Ukraine and Russia, and possible flare-up of the situation turning into a full-scale war, the world already reeling under pressure from the pandemic aftermath might stare at some more risks and uncertainties. While there are always dangers of economic costs spreading beyond the affected region, […]
Social Engineering and Data Breach

There is no question regarding how technically highly-advanced and sophisticated cyber-criminals are. They possess adequate skills and know-how to intrude inside the IT network and steal sensitive information and bring the IT ecosystem to a standstill. Nevertheless, one often overlooked fact is that most of the IT incidents stem from social engineering: an act of […]
Misinformation, Disinformation, and Misinterpretation

Much is being discussed about the security vulnerabilities in the healthcare industry. As the global digital healthcare system finds itself on the cusp of digital transformation, the healthcare records, Intellectual Properties among other forms of sensitive piece of information have become prime targets of cyber criminals. Indeed, the healthcare industry at the peak of the […]
When Bad AI takes on Good AI

In the vast compass of the digitalized world, the good actors often meet roadblocks created by bad actors. The later, as always, want to create a panic, and bring disruptions of all sorts. They look to corrupt or steal the data typically for financial gains. The area of AI is a typical example where bad […]
It’s not just about changing passwords

Alright, passwords are changed regularly and all the updates are being installed unfailingly. Our devices are safe and secure, and the data is going nowhere. That’s the general presumption of ours, isn’t it? And that is a huge mistake. In this large interconnected cyber space, unknown online threats are plenty. Tricksters are always at the […]
Time to Nurture Cybersecurity Pros

Earlier this year, a bizarre cybercrime shook the world. A story broke of a criminal gang known as Fin7 faking a company to recruit potential employees. This gang is believed to have built ransomware earlier that disrupted a large US oil pipeline system company. This whole incident points to one thing: There is a serious […]
Risks, Compliance and Emerging perils

The fallout of financial frauds in the cryptocurrency industry could be devastating and finally regulators are taking note of it. Indeed, regulators are scurrying to bring in a fresh set of guidelines to ensure that the collapse of cryptocurrency network does not end up posing a systemic risk. Some questions remain to be answered though. […]