ARCON recognized as a Customers’ Choice in the Gartner Peer Insights 'Voice of the Customer' for Privileged Access Management. Read More





Social Engineering and Data Breach
Social Engineering and Data Breach

There is no question regarding how technically highly-advanced and sophisticated cyber-criminals are. They possess adequate skills and know-how to intrude inside the IT network and steal sensitive information and bring the IT ecosystem to a standstill. Nevertheless, one often overlooked fact is that most of the IT incidents stem from social engineering: an act of stealing sensitive information through deception and using fraudulent and manipulative ways. And an insider is the key link in this social engineering who can provide necessary information to other actors for executing targeted attacks. Indeed, social engineering has shaken the cyber world time and again. [...]

Posted On | 11-02-2022
Privileged Accounts, Data Breach

When Bad AI takes on Good AI | ARCON | Blog
When Bad AI takes on Good AI

In the vast compass of the digitalized world, the good actors often meet roadblocks created by bad actors. The later, as always, want to create a panic, and bring disruptions of all sorts. They look to corrupt or steal the data typically for financial gains. The area of AI is a typical example where bad actors through AI powered malicious programs try to disrupt all the good things being done by good AI. Indeed, AI is a convoluted program with embedded algorithms to detect patterns. And it can be used both ways. Therefore, it is fair to say that the [...]

Posted On | 14-01-2022
Privileged Accounts, Data Breach

Risks, Compliance and Emerging perils | Risks To Watch | ARCON
Risks, Compliance and Emerging perils

The fallout of financial frauds in the cryptocurrency industry could be devastating and finally regulators are taking note of it. Indeed, regulators are scurrying to bring in a fresh set of guidelines to ensure that the collapse of cryptocurrency network does not end up posing a systemic risk. Some questions remain to be answered though. And how rapidly and effectually these questions are answered will help to secure the cryptocurrency space from risks. One of the reasons behind the changing compliance framework is that ransomware incidents, frauds and financial crimes such as exchanges that launder ransomware payments has been increasing. [...]

Posted On | 12-11-2021
Privileged Accounts, Data Breach

Time to prioritize IT Risk Management

When the going gets tough, the tough gets going— probably one of the most apt expressions to follow and keep the spirits high in departing 2020 as both the global economy and health faced the stiffest challenge in recent times due to the pandemic. Enterprise IT environment wasn’t untouched either. The sudden shift in the manner of how data center workloads, business-critical applications and business privilege accounts were accessed meant that organizations had to become stronger to meet the tougher access control and identity governance challenges. Now, it’s time to look and think beyond the pandemic. Global organizations are gradually [...]

Posted On | 28-12-2020
Privileged Accounts, Data Breach

Tread Wisely between IT Security & Convenience

An exclusive research by Gartner predicts that information security expenditure would exceed $124B by the end of 2019 globally. Despite this steep hike in cybersecurity investments, the number of cyberattacks escalated drastically this year. Most of the industries suffered badly as cyber crooks turn up with more sophisticated techniques among which identity theft tops the list inflicting heavy losses. As we have already reached the last quarter of 2019, the number of data abuse incidents have already increased 3.5 times compared to 2018 and is expected to reach almost 8 times by the year end. It is definitely a grave [...]

Posted On | 27-09-2019
Privileged Accounts, Data Breach

Reinforcing Information Security – Need of the hour in Africa

Threat Landscape One of the major news channels of South Africa suffered massive data breach compromising data of 60 million users (mostly South African citizens) during March 2017. This is considered to be the largest data breach incident in the history of South Africa. Once the hacking news spread like wildfire among the cyber security experts, most of them believed it to be a work of some wily cyber crook. However, later on, it was found that the hacker didn’t require any effort to access the crucial information. Personal Information leaked due to easily accessible Web server. Apart from this [...]

Posted On | 10-05-2019
Privileged Accounts, Data Breach

Select Category