Your Data is Vulnerable: Secure it

With Facebook admitting recently that the data available online of its 2 billion users are mostly vulnerable, recent reports affirmed that a quarter of a billion accounts were compromised. Later on, Facebook CEO Mark Zuckerberg made history by testifying before the US Congress about the data leakage. People realizing the importance of data safety reaches a different level thereafter.

Read More

Identification of Insider Threats

Defying the enemy within

As the wave of digitization sweeps across the nation, it is terribly crucial for the organizations, irrespective of large or small, to take adequate security measures for protecting their huge amount of data generated every day from various sources. The CISOs, CTOs and CSOs are ceaselessly on their toes to curb the chances of any hack or data breach incident that might push them towards big irrevocable losses. This scenario of insider threats is considered to be one of the most sinister reasons for digital disaster.

Identification of Insider Threats

The implications of insider threats largely go to the administrators and other privileged users, who are commonly

Read More

Knowledge-driven World Spurs Innovation but also Brings Risk

We live now in a knowledge-driven world where advanced technologies like ‘big data’ analytics spur innovation and boost efficiency. Thanks to it, companies are now able to collect and analyze a large set of data, allowing them to study the industry’s trends and patterns, in a real-time.

Increasing digitization of businesses, however, has also given rise to cybercrimes. Every year, businesses witness cybercrime related losses that run into billions of dollars. Our information systems today are constantly under risks. Ransomware, hacking from rogue elements, and denial-of-service assaults are very rampant.

Read More

Recent Bank Heists: Why to Compromise Critical IT Assets?

A $101 million bank heist, earlier this year, brought the issue of cybersecurity to the forefront once again. In a sophisticated operation, cybercriminals robbed the Central Bank of Bangladesh by getting hold of SWIFT (society for Worldwide Interbank Financial Telecommunication code), the access code for global cross-border payment messaging system.

More important, it wasn’t an isolated case. Even as the dust over Bangladesh bank incident had not settled, the global banking system was again taken aback. This time it was an Ecuador bank, which was hit by a $12 million cyber-heist. The modus operandi was same.

Read More

Will businesses stand the ‘risk’ of times?

All the top businesses today – Manufacturing& Distribution, Banking & Financial Services, Consumer Products & Services, Technology, Media & Communications, Healthcare & Life Sciences and Energy & Utilities – are expected to grow at a fast pace in the coming decade.

However the evolution of these businesses comes at the cost of rising risks. Analyzing and mitigating the risk factors should take precedence when devising strategies.

Several global studies report the following 10 risks businesses face as of 2016 and beyond:

Read More

Mapping Privileged Identity Management to an exotic travel

When I had started out in this industry, I had absolutely no clue of what Privileged Identity Management meant. In fact, not for a moment I thought it had something to do with security let alone cyber-security. I was deceived by the term ‘Privileged’ so much so that I started considering it be an elitist term which is like a badge to be worn proudly by some. But what I got to know about this was a complete paradigm shift. Yes of course I was right in thinking that it is a sort of title so to speak conferred only upon a select few. But that they can be threats never crossed my mind. Over the years, I observed that not many could easily understand the real meaning behind the term Privileged Identity Management or Privileged Access Management or Privileged User Management or other terms that this concept is referred to by. I pondered and pondered of how this can be explained in simple language to a layman. So here’s my attempt at it.

Read More

Cybersecurity: Tackling the insider threat

Summary:  In 2014, the world learned the hard way about data breaches due to insider threats. Learn why insider threats have become an increasing security risk and how to protect one’s self from it.

In a world where data breaches are quickly becoming commonplace, even the best security technology in the world can’t help your organization to protect itself from security breaches unless your employees understand their roles and responsibilities in safeguarding sensitive data and protecting company resources.

Read More