Malicious Insiders: Sturdy Reason for Cyber Risks

While organizations have started giving utmost importance to cyber security and have started allotting handsome budget for saving their digital assets, cyber crooks are getting smarter and giving birth to more sophisticated attack techniques. Today, suspicious insiders are giving more nightmare to the IT security officers rather than outsiders. According to the latest research, organizations cough up to $8 million annually as a price paid for the damages done by malicious insiders.

Read More

Your Data is Vulnerable: Secure it

With Facebook admitting recently that the data available online of its 2 billion users are mostly vulnerable, recent reports affirmed that a quarter of a billion accounts were compromised. Later on, Facebook CEO Mark Zuckerberg made history by testifying before the US Congress about the data leakage. People realizing the importance of data safety reaches a different level thereafter.

Read More

Are you protecting data amid digital revolution?

Who would have thought about a decade ago that digital revolution could completely transform the way organizations conduct routine operations?

From large retailers analyzing and predicting customers’ purchasing decisions to supply chain firms adopting ‘smart’ technologies to ensure quality controls, disruptive technologies such as big data analytics and the IOTs have enabled firms to capture and effectively use the vital statistics in a real-time.

Read More

Financial Implication of a Data Breach is Huge

We have been touring across the world since the beginning of the year, participating in several IT security events. While our main goal is to educate organizations–amid rising cybercrime– to reinforce their information systems by adapting to our risk-management solutions, we are also meeting with Chief Information officers (CIOs), Chief Information Security Officers (CISOs), and audit and compliance officers.

One-to-one meetings help us in understanding IT security needs. As an IT security provider, however, we must tell you that it is very heartening to find that organizations across all industries, have shown increased awareness towards cyber-security.

Read More

Data like water

is data like water?

Data like water is an interesting analogy, It was only during one of my vacations that along a beach, i realized how the two are really similar and especially in the world of technology how data flow is akin to water flow. This paper tries to establish similarities, one’s ability to capture and track source. Further how identities are critical and how data can be tagged to various users. Also it is critical to examine the storage and linkages to the identities under which data is stored.

how important is data

Read More

A Billion Dollar Hack: – How hackers exploited Unprotected Privileged Accounts

Summary: How the Carbanak hacker’s group stole a billion dollars without getting caught and what we

learn from it.

The financial world and the security industry have been rocked by the recent report from Kaspersky about the cyber-criminals that have stolen more than $1 Billion from global banks through cyber-attacks. The initial reports link the attacks to a multinational criminal group, and highlight the use of sophisticated malware, dubbed Carbanak.

Read More