Threat Intelligence: A Must For All OrganizationsBy Mahendra Patukuri On 9 Nov 2016
Why is everyone talking about it? There is a disturbing trend that has developed over the last few years – cyber attackers are innovating much faster than the security defenders. Just about anything and everything is a potential attack vector....
Cyber Risk and the Need for an Integrated ApproachBy Mahendra Patukuri On 9 Nov 2016
It is a matter of existential threat: We live in a world where organizations have become overtly technology dependent with digitalized systems and online services. Reported breaches of information security have been rising at an alarming rate. It is not...
Unified Compliance ManagementBy Mahendra Patukuri On 28 Oct 2016
The global business climate is always on a churn owing to various reasons. Sometimes it is technology, sometimes its politics at other times it geo-strategy. Whatever the reason be, laws and rules keep changing. Regulation has become the order of...
Detection-Protection-Prevention – The Threat Defense LifecycleBy Mahendra Patukuri On 28 Oct 2016
Cyber-attacks have become an everyday phenomenon today. It is a menace that is growing with each passing day. New types of threats are emerging and their average damage potential is also growing fast. The average cost of a cyber-security/data breach...
Data breach and Cyber attacksBy Mahendra Patukuri On 28 Oct 2016
Data breaches and cyber-attacks are two terms that are increasingly making headlines in the world of Cyber security. Cyber-attacks are made to create data breaches and there are very few data breaches without cyber-attacks. The first has a causal relationship...
These blogs might interest you
by Mouna Ramesh on 28 Aug 2019
by Subramanya Ajjampur on 2 Aug 2019
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
Subscribe for blog updates