ARCON recognized as a Customers’ Choice in the Gartner Peer Insights 'Voice of the Customer' for Privileged Access Management. Read More

x

IDENTIFYING THE RISKS BEFORE TIME

WE BELIEVE IN PROTECTING THE DATA WITH ADVANCED METHODS

RISKS TO WATCH

Managing IT Risks in CSP Environments

The Impending Risk in CSP Environments It is very important for organizations to think, analyze and peruse the IT security factors of a Cloud Service Provider (CSP), which possesses every possible sensitive detail of an organization’s IT resources. Indeed, the cloud managers literally have complete control over the cloud infrastructure, even as the IT security staff has to manage and control not only the cloud console admins but also the various kinds of identities that access a host of applications and development platforms.  Recently, a former engineer from one of the leading CSPs was found guilty of hacking into more [...]

Posted On | 24-06-2022
Privileged Accounts, Data Breach

Cloud Services Adoption: Urgent Requirement for Regulatory Guidelines

According to Gartner, worldwide end-user spending on public clouds could reach almost $500 billion in 2022. In addition to the financial benefits (cost effectiveness), cloud computing offers more scalability, flexibility, mobility, and operational efficiency. For various reasons, it is very obvious that storing and analyzing data on the cloud is at the core of digital transformation. And that’s why Indian commercial banks want the regulator, the Reserve Bank of India (RBI) to lay down a clear set of security and compliance guidelines that would allow Indian banks to adopt cloud computing in a big way.  Grappled with falling margins, accumulating [...]

Posted On | 10-06-2022
Privileged Accounts, Data Breach

Reinforcing the IAM Fabric for Digital Innovation

From a wide range of merchant payment providers to peer-to-peer lending platforms, payment gateways have come a long way to remodel the financial services space. Thanks to technological advances, there is a complete transformation of the ways we manage our finances.  Financial innovation has ushered financial inclusion. Indeed, different digital payment modes have not just opened a sea of options in front of us but also eased our lives beyond ATM machines and cash transactions. We have mobile apps to check, update or transfer money through mobile banking. We have e-wallets to ease our payment processes in e-commerce platforms and [...]

Posted On | 27-05-2022
Privileged Accounts, Data Breach

Zero Trust, Controlled Privileges and Data

ARCON has always propagated the message of controlling and protecting the inner realm of an organization’s IT network. It builds the foundation for robust cybersecurity.  Whether the cyber-criminal sits outside the realm or is present inside the periphery, typically it is the compromised insider-privy to confidential information- who is behind an insider attack or cyber-espionage. Recently approximately thirty (30) multinational companies faced the wrath of state-sponsored actors. The incident has brought to the forefront yet again the dire need to adopt robust access management methods to prevent the theft and exfiltration of sensitive data.  What exactly happened? A report published [...]

Posted On | 24-05-2022
Privileged Accounts, Data Breach

Critical IT Infrastructure: Time to Push the Alert Button

Overview It is not uncommon that critical systems are often targeted by cyber criminals. And we have documented it from time to time. But this time the attack was on toll collection systems.  Indeed, gone are those days when you take out your wallet to pay highway tolls while driving through the city suburbs. Today the latest technologies are adopted at the highway tolls for making the payment process fast and easy. With the help of the Radio Frequency Identification (RFID) technology, toll payments are made directly while the vehicle is in motion. A device is affixed on the windscreen [...]

Posted On | 27-04-2022
Privileged Accounts, Data Breach

Unauthorized Access: It’s not just about databases

Overview A recent report by The Economic Times (CISO) revealed that more than 600 twitter accounts, emails and websites pertaining to the government of India were compromised in the last five years. CERT-In, the official government body that notifies the affected entities along with remedies, have also confirmed these shocking statistics.  The ‘Digital India’ drive, announced by the Government of India, has received  lots of applause and appreciation from both in India as well as the rest of the world. In order to fructify this grand initiative, it is important to safeguard the messaging and communications infrastructure though.  Still, many [...]

Posted On | 13-04-2022
Privileged Accounts, Data Breach

Data Security: A Never-ending Concern | Risks To Watch | ARCON
Data Security: A Never-ending Concern

It is not a bank, a government entity or a healthcare organization! This time the cyber crooks strike hard on the entertainment industry! Recently, a USA-based vendor that designs graphics processing units for the gaming and professional markets suffered a compromise of emails of more than seventy thousand employees. Can there be anything worse? The victim also manufactures chip units for the mobile computing and automotive market. As a result, they had a huge and irreparable face loss in front of the global market.  The pattern and extent of the IT risks that organizations are exposed to today are getting [...]

Posted On | 25-03-2022
Privileged Accounts, Data Breach

Secure Passwords, Save your Digital Assets

Who can forget the infamous data breach incident of one of the popular file hosting service providers where more than 60 million users’ email addresses and passwords got affected? An employee just reused a password at work and that was the mistake. The password was broken through to steal the valuable records of the organization. Password Management plays a very crucial role in securing digital assets of organizations but unfortunately most of the times we find that it is neglected to the core. Adding to the woes, organizations site excuses of difficulties in managing a huge number of passwords in [...]

Posted On | 22-12-2018
Privileged Accounts, Data Breach

Select Category