Ransomware has the potential to not only lock away your firm’s critical data but also is an added expense for your firm. This digital extortion has been around on a consistent rate and is going to be that way for a long time. Ransomware malware can be in various forms… read more →
The growth of cyberattacks has been on a steady rise and so are hackers engaged in ransomware. In these kind of situations cyber blackmailers extract sensitive data or encrypt important files and in exchange to access this data a certain payment is taken. Multiple organisations from diverse sectors have fallen… read more →
Ransomware has ceased to become a threat only for the individual computers and now are an imposing threat to bigger organisations and their sensitive data. Hackers target bigger companies as they can extort huge funds from the same. This growing trend has put the firms on a constant alert mode… read more →
Pokémon Go has taken the gaming industry by storm. With many users getting engaged with it the game is creating a lot of waves. However, not all of them have been noted to be positive. Given the growing buzz of the popularity that this game is making one of the… read more →
Weak codes have always been one of predominant reasons for software hacking posing as a major cyber security threat to organisations. Despite of the fact that there are rigorous automated testing tools that try to identify and resolve weak codes the problem still persists giving a small opportunity for hackers.… read more →
With more businesses opting cloud computing for several operations maintaining data integrity and security has become a growing concern. Even though cloud has its own set of advantages such as flexibility, accessibility, cost-efficiency and others, security stands as one of the toughest challenges. As much as cloud computing has become… read more →
Mobile applications are evolving with newer purposes and are becoming key to businesses across industries. However most of them still remain vulnerable to attacks. This stems from the reason that either there aren’t efficient development practices applied or the developers are unaware of the underlying threats to the entire concept… read more →
In the last blog, we saw what entails NIST’s Cybersecurity framework. In this blog, let us see Intel’s implementation of NIST’s CSF. NIST – Intel Case study A classic case of adoption of NIST Cyber Security framework (CSF) has been articulated by Intel. Shared during an NIST workshop in… read more →
As seen in the last blog, the Executive Order of the President of the United States calls for the development of a voluntary risk-based Cybersecurity Framework (CSF) – a set of industry standards and best practices to help organizations manage cybersecurity risks. Building from those standards, guidelines, and practices, the… read more →
Introduction: Cybersecurity has become a crucial part of an organisation’s infrastructure. Hackers or cyber criminals can manipulate the systems with well-co-ordinated plans and can misuse the intellectual property of the businesses thereby leading to disruption. With the growing sophistication of cyber-attacks investing in an optimal security system is the need… read more →