Threat Intelligence: A Must For All OrganizationsBy Mahendra Patukuri On 9 Nov 2016
Why is everyone talking about it? There is a disturbing trend that has developed over the last few years – cyber attackers are innovating much faster than the security defenders. Just about anything and everything is a potential attack vector....
Cyber Risk and the Need for an Integrated ApproachBy Mahendra Patukuri On 9 Nov 2016
It is a matter of existential threat: We live in a world where organizations have become overtly technology dependent with digitalized systems and online services. Reported breaches of information security have been rising at an alarming rate. It is not...
Unified Compliance ManagementBy Mahendra Patukuri On 28 Oct 2016
The global business climate is always on a churn owing to various reasons. Sometimes it is technology, sometimes its politics at other times it geo-strategy. Whatever the reason be, laws and rules keep changing. Regulation has become the order of...
Detection-Protection-Prevention – The Threat Defense LifecycleBy Mahendra Patukuri On 28 Oct 2016
Cyber-attacks have become an everyday phenomenon today. It is a menace that is growing with each passing day. New types of threats are emerging and their average damage potential is also growing fast. The average cost of a cyber-security/data breach...
Data breach and Cyber attacksBy Mahendra Patukuri On 28 Oct 2016
Data breaches and cyber-attacks are two terms that are increasingly making headlines in the world of Cyber security. Cyber-attacks are made to create data breaches and there are very few data breaches without cyber-attacks. The first has a causal relationship...
These blogs might interest you
by Chamale Shettar on 28 Apr 2022
by Debabrata Goswami on 12 Apr 2022
by Ajay Agrawal on 28 Mar 2022
by Sneha Bati on 28 Mar 2022
Subscribe for blog updates