Alarming Gap in Response to Data Security

A recent study suggests that a good number of Indian organizations are showing a lackadaisical attitude towards data security norms and initiatives. Whether it is personal identifiable data or electronic health records, most of the organizations are lacking cyber risk management strategies that ensure data security. About 60% of Indian organizations surveyed are not sure […]
Why Contextual Authentication?

Contextual authentication is gaining more and more prominence in the overall cyber threat and IT frauds prevention landscape. The risk stemming from IT fraudsters needs attention as the ‘bad actors’ often outsmart ‘good actors’ in the cyber warfare. The bad actors have an uncanny knack to deceive the security controls in place. Although organizations and […]
Would you still ignore endpoint privilege management?

That critical infrastructure is increasingly eyed by sophisticated cybercriminals and the security posture requires urgent attention to thwart rising targeted attacks was brought to the fore yet again when a water management facility was accessed by a hacker a few days ago. And this incident is still in the news because this one is not […]
Cyber Criminals Target Data, not Industry

Today, data breach incidents have become common news headlines across the globe. A layman’s psychological traits drive the idea of any data breach incident towards financial institutions. According to the trends and our findings, we come across several instances where people estimate the common reason for any breach incident is to take hostage of confidential […]