Purple Teaming – Next-Gen SOC with an attacker’s mindsetBy Samit Chowdhury On 16 Aug 2021
Today, Penetration testing (aka pen tests) has become an integral part of any cybersecurity system that pre-determines the system's vulnerabilities and fill those gaps before an external attacker exploits it. Red Teaming is a broader approach to penetration testing that...
Best practices to lock down cyberattacks during the COVID-19 pandemic outbreakBy Vijay Bharti On 13 Apr 2020
The novel coronavirus has resulted in a health and economic crisis, and lockdowns have been announced across different parts of the world. If you are responsible for running a business, your first concern sure was to keep your business running...
The Magnitude of Cyber Espionage And Addressing it with Threat IntelligenceBy Vijay Bharti On 30 Mar 2020
In the current digitally advanced world, we hear about armies of immoral hackers secretly spying on their targets and stealing information—classified, sensitive data or intellectual property. This practice of secretly gaining access to critical information without permission from the data...
It’s only a matter of time before you become the next victim to a ransomware attack!By Susmita Sankaran On 17 Nov 2017
Remember the good old days when we discussed about number of computers getting infected by malicious content? Ironic- considering we are discussing about malicious content and ‘good’ in the same breath. Well, if you think of the meteoric rise of...
Behavioural Analytics – The armoury against the cyber threatsBy Sandeep Mukherjee On 6 Nov 2017
May 12th, 2017 saw the spread of ransomware strain ‘’WannaCry’’ infecting the systems of thousands of individuals, corporate, and public utility companies. The attack created panic and chaos for many patients as many vital medical services were delayed due to...
These blogs might interest you
by Nithin Satyan on 1 Oct 2021
by Shaan Panda on 20 Sep 2021
by Viswanath Subramaniam on 12 Aug 2021
by Sandeep MN on 29 Jul 2021
Subscribe for blog updates